• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

Cybersecurity
Asset ManagementPRESENTED BY

  • Home
  • Features
  • Video
  • Resources

Features

So many assets, so little visibility: Today’s device inventory challenges

By Nathan Burke

Once upon a time, conducting a device inventory was as simple as walking through the office and ticking off the number of computers you had. Nowadays, that sounds like a fairy tale. Today, that same inventory requires tracking down each device used to access your company’s systems or information by every single employee. It’s no longer a carefree magical journey — it’s a … [Read more...] about So many assets, so little visibility: Today’s device inventory challenges

Security basics: If you can’t make them sexy, make them simple

By Nathan Burke

I’m a huge fan of the CISO/Security Vendor Relationship Podcast, and one episode featured a great conversation about how security teams really want a way to consistently execute on security basics rather than buying narrow technologies focused on the edge. NARROW AND EXCITING VS. BROAD AND BORING First, Justin Berman, now Head of Security at Dropbox: “I think that … [Read more...] about Security basics: If you can’t make them sexy, make them simple

Work-from-home has huge, built-in security challenges

By Stephen Lawton

Historically, corporations that had established work-from-home programs using company-supplied hardware and software had a limited number of security issues that needed to be managed for their employees. Since the employees used company-owned and preconfigured systems, the employer had the opportunity to create a controlled environment for their remote users. Then along came … [Read more...] about Work-from-home has huge, built-in security challenges

Building a Better Asset Management Program

By Evan Schuman

Network vulnerabilities are everywhere — to find them you simply have to keep your eyes open. But vulnerabilities don’t live in a vacuum, they often occur in conjunction with some other IT security policy or procedure violation, creating a multilayer challenge for the security team. Recently, Atuf Ghauri, the cybersecurity practice lead at the accounting/consulting firm … [Read more...] about Building a Better Asset Management Program

What, why, and how of cybersecurity asset management

By Lenny Zeltser

How can we secure an IT resource if we don’t know that it exists or if we don’t have visibility into its state? To quote respected industry practitioner Adrian Sanabria, “Most security and IT problems begin with visibility.” Security practitioners crave visibility into the state of laptops, vices, virtual machines, applications, and users in their … [Read more...] about What, why, and how of cybersecurity asset management

« Previous Page
Next Page »

Primary Sidebar

The asset management challenge

Tweets by AxoniusInc

Footer

Cybersecurity Asset Management is a partnership between Axonius and SC Media. Its mission is to highlight best practices, thought leadership and important trends related to IT asset management’s evolving role in cybersecurity.

SC Media is cybersecurity. For 30 years SC Media armed information security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders, custom research, and independent product reviews in partnership with and for top-level information security executives and their technical teams.

Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

Contact Us

© 2020 Axonius & SC Media