See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

Ensure compliance with DORA’s ICT risk framework using runZero runZero Insights

Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.

Subscribe Now

Get our latest Rapid Responses, insights, and blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Rapid Response
How to find Lexmark printer assets on your network
February 3, 2023
Printer manufacturer Lexmark recently published details on a vulnerability that affects over 100 of their printer models. Learn how runZero can...
Life at runZero
How to create cultural values for your company
January 31, 2023
From kindness, to transparency, to staying fully remote, runZero created a workplace that puts employees first. Read more to discover how we...
runZero Insights
Single source of truth? The truth about CMDBs
January 31, 2023
Are you using a Configuration Management Database (CMDB) for IT asset inventory? The truth is that it's not enough to cover all your bases. You...
Product Release
Speed up pentesting with runZero
January 30, 2023
runZero may not be the first tool you think of when you talk about penetration testing but we have several ways of helping with reconnaissance....
Life at runZero
Why we chose to be a fully remote company (and how we make it work)
January 24, 2023
For many companies, remote work is here to stay. At runZero, we pushed ourselves to think about how we can build a remote culture the right way....
Industry
Why vulnerability scanners cannot provide comprehensive asset inventory - Part 2
January 18, 2023
Vulnerability scanners use checks to test for specific CVEs. They were not built with asset inventory in mind. Vulnerability scanners typically...
Life at runZero
Creating a culture of transparency
January 17, 2023
Open and honest dialogue is the cornerstone of any healthy team. Carrying out transparency in everything we do creates deeper connections between...
Industry
Why runZero is the best way to fulfill CISA BOD 23-01 requirements for asset visibility - Part 1
January 11, 2023
CISA BOD 23-01 requires better asset inventory and vulnerability management practices. This six-part series dives into why runZero is the best...
Life at runZero
Fostering a culture of kindness at runZero
January 9, 2023
A kind, fair, and just culture sets a strong foundation for employees to feel secure in their environment which increases productivity. Learn how...
Industry
CISA BOD 23-01: Why vulnerability scanners miss the mark on asset inventory
December 21, 2022
Most agencies will attempt to leverage existing solutions, like their vulnerability scanners, to build their asset inventories. It seems reasonable...
Product Release
runZero 3.4 Vulnerability import from CrowdStrike Spotlight (plus something for everyone)
December 13, 2022
What’s new in runZero 3.4? Vulnerability import from CrowdStrike, integration improvements and enhancements, OAuth Client Secret authentication,...
Rapid Response
How to find Cisco 7800 and 8800 series IP phone assets on your network
December 9, 2022
Cisco 7800 and 8800 IP phones can be found in many companies and organizations. Successful exploitation of this vulnerability can provide an...
© Copyright 2024 runZero, Inc. All Rights Reserved