Uncertainty, Balance sheet, Risk, Information security, Management, Computer security

3 ways IT pros can use Axonius

On Jul 30, 2020
@SCMagazine shared
How can you use @AxoniusInc? Three ways Axonius can fit into your orgainzation: https://t.co/rLEuGbKcDL
Open

When we talk to people about Axonius for the first time, we often hear this: “Your platform is a Swiss Army knife of sorts.”

cam.scmagazine.com
On Jul 30, 2020
@SCMagazine shared
How can you use @AxoniusInc? Three ways Axonius can fit into your orgainzation: https://t.co/rLEuGbKcDL
Open

3 ways IT pros can use Axonius

3 ways IT pros can use Axonius

When we talk to people about Axonius for the first time, we often hear this: “Your platform is a Swiss Army knife of sorts.”

Operation eligible receiver – the birthplace of cyber security: vulnerabilities

Operation eligible receiver – the birthplace of cyber security: vulnerabilities

These include NIST 800-53, The Common Vulnerability Scoring System (CVSS), and The National Vulnerability Database. When vulnerabilities are audited, members from both security teams and ...

Q&A: Asset management and risk

Q&A: Asset management and risk

In this installment of the Axonius Q&A series, CISO Lenny Zeltzer discusses how IT asset management impacts risk management.

How to perform a risk assessment: Rethinking the process

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.

Leveraging automation to maximize security budgets

Leveraging automation to maximize security budgets

In order to maximize security budgets, organizations need to develop a dynamic understanding of the assets in their network.

Questions Every CEO Should Ask About Cyber Risks

Questions Every CEO Should Ask About Cyber Risks

As technology continues to evolve, cyber threats continue to grow in sophistication and complexity. Cyber threats affect businesses of all sizes and require the attention and involvement of ...

6 Ways Effective CISOs Are Changing their Role

6 Ways Effective CISOs Are Changing their Role

The new normal for forward-thinking CISOs includes coaching, increased visibility, and embracing new technology frameworks and priorities.

4 ways your company can avoid a data breach

4 ways your company can avoid a data breach

Only one in three organizations say they are confident they can prevent data breaches, according to Balbix.

How to Make a Security Transformation

How to Make a Security Transformation

A successful digital transformation journey must include a security transformation journey that includes a careful examination of risks, says Ganesh Prasad of RSA.

What is Trusted Support?

What is Trusted Support?

What is Trusted Support?  Brennan Baybeck, VP Global I.T. Risk Management, at Oracle joins industry analyst and CXOTALK host,Michael Krigsman, to discuss the role of trusted support as a ...

IBM in “Leaders” Quadrant of 2019 Gartner Magic Quadrant for IT Risk Management, fourth report in a row

IBM in “Leaders” Quadrant of 2019 Gartner Magic Quadrant for IT Risk Management, fourth report in a row

IBM is once again positioned in the Leaders Quadrant of the 2019 Gartner Magic Quadrant for IT Risk Management for governance, risk & compliance.

Reviewing best practices for IT asset management in the cloud

Reviewing best practices for IT asset management in the cloud

It used to be that businesses needing their own large computer networks had to do everything themselves. They had to buy all of their servers, all of their networking appliances. They ...

Chart a Path towards Your Digital Future—While Navigating Digital Risk

Chart a Path towards Your Digital Future—While Navigating Digital Risk

From Australia to the EU and the United States, countries are sponsoring cyber awareness efforts during the month of October to help combat a persistent challenge: cybersecurity threats. ...

How IT asset management works

How IT asset management works

Understanding where your assets are — whether they are local or in the cloud — can serve the needs of multiple corporate masters.