runZero Insights


runZero Insights
The cybersecurity tools inefficient for CAASM
July 26, 2023
Each article in this roundup explains the downsides of common tools as they pertain as effective CAASM solutions, and how runZero, a complete CAASM...
runZero Insights
Best free network scanners for security teams
July 18, 2023
In this article, we compare and contrast several free tools and provide our take on why we believe runZero is best suited for corporate security...
runZero Insights
Why NACs are inadequate for cyber asset attack surface management
July 10, 2023
NACs aren’t the best at asset discovery. Allowing or denying access to the network on Layer 2 is their primary function, but finding everything on...
runZero Insights
Closing the gap Power your CMDB with CAASM for better ROI
June 29, 2023
According to Gartner, only 25% of organizations achieve meaningful value with their CMDBs. Let’s dig into why and how a CAASM solution can improve...
runZero Insights
Limitations of vulnerability scanners in attack surface management
June 20, 2023
Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong; crashing devices, providing a backward-looking view, finding phantom...
runZero Insights
Why spreadsheets are bad for cyber asset attack surface management
June 8, 2023
An accurate and full asset inventory is vital for an effective security program. Understand the risks and limits of using spreadsheets to manage...
runZero Insights
runZero’s week at RSA 2023 killer robots, time machines, and natural disasters
May 12, 2023
Watch Chris Kirsch chat with Chris Nickerson, then Roger Rustad to talk pentesting “war stories”, and how runZero has helped the Fortinet team.
runZero Insights
Asset inventory is foundational to security programs
April 13, 2023
Asset inventory is the foundation of a strong cybersecurity posture. It is often considered the first step in identifying vulnerabilities and...
runZero Insights
Single source of truth? The truth about CMDBs
January 31, 2023
Are you using a Configuration Management Database (CMDB) for IT asset inventory? The truth is that it's not enough to cover all your bases. You...
runZero Insights
Which discovery approach works best for unmanaged devices?
November 3, 2022
Unmanaged devices are the Achilles heel of any asset inventory. Shadow IT, rogue, or orphaned devices are easy targets for the adversary to gain...
runZero Insights
Transient cyber assets: managing the unmanageable
September 1, 2022
Transient assets can introduce unique challenges to tracking asset inventory and securing your network, especially in the education sector....

Discover the new era of exposure management!