When we talk to people about Axonius for the first time, we often hear this: “Your platform is a Swiss Army knife of sorts.”
When we talk to people about Axonius for the first time, we often hear this: “Your platform is a Swiss Army knife of sorts.”
These include NIST 800-53, The Common Vulnerability Scoring System (CVSS), and The National Vulnerability Database. When vulnerabilities are audited, members from both security teams and ...
In this installment of the Axonius Q&A series, CISO Lenny Zeltzer discusses how IT asset management impacts risk management.
New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.
In order to maximize security budgets, organizations need to develop a dynamic understanding of the assets in their network.
As technology continues to evolve, cyber threats continue to grow in sophistication and complexity. Cyber threats affect businesses of all sizes and require the attention and involvement of ...
The new normal for forward-thinking CISOs includes coaching, increased visibility, and embracing new technology frameworks and priorities.
Only one in three organizations say they are confident they can prevent data breaches, according to Balbix.
A successful digital transformation journey must include a security transformation journey that includes a careful examination of risks, says Ganesh Prasad of RSA.
What is Trusted Support? Brennan Baybeck, VP Global I.T. Risk Management, at Oracle joins industry analyst and CXOTALK host,Michael Krigsman, to discuss the role of trusted support as a ...
IBM is once again positioned in the Leaders Quadrant of the 2019 Gartner Magic Quadrant for IT Risk Management for governance, risk & compliance.
It used to be that businesses needing their own large computer networks had to do everything themselves. They had to buy all of their servers, all of their networking appliances. They ...
From Australia to the EU and the United States, countries are sponsoring cyber awareness efforts during the month of October to help combat a persistent challenge: cybersecurity threats. ...
Understanding where your assets are — whether they are local or in the cloud — can serve the needs of multiple corporate masters.