Blog

Employee-first Cyber Security Training to Protect Against Cyber Attacks

Employee-first Cyber Security Training to Protect Against Cyber Attacks

Why aren’t we doing a better job of cyber security training for humans? If 82% of cyber security attacks [1] are human-caused, surely the biggest security focus should be on “fixing” humans — so why isn’t it? The prevailing “wisdom” seems to be “buy more tools” (that nobody will use) or “write a process document”

Read More
runZero platform introduction

runZero platform introduction

runZero platform provides businesses with a unified view of assets in their network. The runZero platform merges asset, network, software, vulnerabilities, and user data from IT and security solutions to provide a comprehensive overview of the network. One unique feature of runZero is its unauthenticated scanner that does not require credentials or captured traffic. Why

Read More
Axonius cybersecurity asset management introduction

Axonius cybersecurity asset management introduction

The Axonius cybersecurity asset management platform provides IT and security teams with a comprehensive and automated view of an organization’s assets. In this article, we provide a briefing for IT Security practioners who are researching the area of security asset management and are learning where Axonius fits into the landscape. How does Axonius cyberecurity asset

Read More
Network Performance Monitoring in 2023

Network Performance Monitoring in 2023

TLDR: Why is the network guilty until proven innocent? Are modern IT trends adding more trumped up charges? The answers are yes, and in this piece we’ll show how NPM is being redefined, the trends that are shaping it, then we’ll look at a couple of examples of modern Network Performance Monitoring (NPM) tools and

Read More