See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

How to find BeyondTrust appliances on your network Rapid Response

BeyondTrust disclosed that affects their Privileged Remote Access (PRA) and Remote Support (RS) products. This has also been added to the CISA KEV as it has been exploited in the wild.

Subscribe Now

Get our latest Rapid Responses, insights, and blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Industry
Why vulnerability scanners cannot provide comprehensive asset inventory - Part 2
January 18, 2023
Vulnerability scanners use checks to test for specific CVEs. They were not built with asset inventory in mind. Vulnerability scanners typically...
Life at runZero
Creating a culture of transparency
January 17, 2023
Open and honest dialogue is the cornerstone of any healthy team. Carrying out transparency in everything we do creates deeper connections between...
Industry
Why runZero is the best way to fulfill CISA BOD 23-01 requirements for asset visibility - Part 1
January 11, 2023
CISA BOD 23-01 requires better asset inventory and vulnerability management practices. This six-part series dives into why runZero is the best...
Life at runZero
Fostering a culture of kindness at runZero
January 9, 2023
A kind, fair, and just culture sets a strong foundation for employees to feel secure in their environment which increases productivity. Learn how...
Industry
CISA BOD 23-01: Why vulnerability scanners miss the mark on asset inventory
December 21, 2022
Most agencies will attempt to leverage existing solutions, like their vulnerability scanners, to build their asset inventories. It seems reasonable...
Product Release
runZero 3.4 Vulnerability import from CrowdStrike Spotlight (plus something for everyone)
December 13, 2022
What’s new in runZero 3.4? Vulnerability import from CrowdStrike, integration improvements and enhancements, OAuth Client Secret authentication,...
Rapid Response
How to find Cisco 7800 and 8800 series IP phone assets on your network
December 9, 2022
Cisco 7800 and 8800 IP phones can be found in many companies and organizations. Successful exploitation of this vulnerability can provide an...
Industry
CISA BOD 23-01 requires asset visibility and vulnerability detection as foundational requirements
November 22, 2022
CISA released the BOD 23-01 in an effort to stengthen the national security posture with new asset inventory and vulnerability management...
Product Release
A 365-degree view of your Microsoft environment
November 22, 2022
As the scope of corporate networks has been constantly expanding over time, the challenge of maintaining an accurate asset inventory and...
Product Release
runZero 3.3 Unmatched visibility into your Google ecosystem
November 15, 2022
What’s new in runZero 3.3? Visibility into Google Workspace, fingerprinting for Google assets, identification of OpenSSL services, and improvements...
runZero Insights
Which discovery approach works best for unmanaged devices?
November 3, 2022
Unmanaged devices are the Achilles heel of any asset inventory. Shadow IT, rogue, or orphaned devices are easy targets for the adversary to gain...
Product Release
Introducing the runZero Infinity Partner Program
November 1, 2022
The runZero Infinity Partner Program provides partners with the resources, enablement, content, training, and support to deliver a powerful cyber...
© Copyright 2024 runZero, Inc. All Rights Reserved