Perception vs. Reality on Security Hygiene and Asset Management
The deceptive complexity of an asset inventory has led to a significant and dangerous gap between our perception of how well we are executing and the reality of our execution.
The deceptive complexity of an asset inventory has led to a significant and dangerous gap between our perception of how well we are executing and the reality of our execution.
The weakest link in our security programs is not whether we have the right tools for our organization, it’s that we don’t deploy the tools that we own comprehensively.
We’re sharing some of our learnings in an 8-part short video series: how can security and IT teams get a comprehensive, up-to-date view of their IT assets?
ITAM and CMDB were groundbreaking technologies when they were developed. But the simple fact is that they are no longer up to the task.
Co-Founder & CEO of Sevco Security J.J. Guy joins host Andy Bonillo to remind everyone that compromise is inevitable and that we need to get back to the basics.
We here at Sevco are extremely proud to be recognized as a sample vendor in the newly identified Cyber Asset Attack Surface Management (CAASM) category in the Gartner Hype Cycle for Network Security, 2021 report.