This is the last in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management and Part 2 focused on how a cybersecurity asset management solution improves an organization’s vulnerability management program. Part 3 of the series provides a brief summary and some perspectives on the benefits of a cybersecurity asset management solution as it relates to vulnerability management.
Cybersecurity Asset Management for Vulnerability Management: Key Capabilities, Benefits
By Chris Steffen on Feb 28, 2022 8:46:39 AM
F5 WAF / AWS CloudFront Integration...
By Chris Steffen on Oct 20, 2020 8:00:00 AM
Recently, I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS). Before discussing the announcement specifically, I thought it would be best to provide a bit of insight into these complementary technologies.
Security Awareness Programs Are Not just For Compliance
By David Monahan on Jan 16, 2014 8:35:20 PM
I see a significant gap in not only how the need for Security Awareness training is perceived as needed but also in the general quality of the programs and training delivered vs other types of training. In many cases small companies avoid security awareness training due to ignorance, cost fears, or fears it will stifle their culture of creativity. This research project is structured to give CIO’s, CISO’s, and other security and IT managers the data to motivate them to provide in security awareness training programs thereby bringing about change in their organizations.
Introduction and Thoughts About Recent Surveillance “Revelations”
By David Monahan on Jan 16, 2014 8:34:53 PM
Hello everyone! I have been at Enterprise Management Associates for a couple of months now and decided that it is time to write an introduction and blog. For those of you who have been following the blog from Scott Crawford, I hope you will find my blogs stimulating and possibly entertaining. I tend to throw a few zingers in on occasion for a little humor as sometimes security writing can come across a little dry.