Sevco Blog

Video Series: Part 1 – The Weakest Link

Security
Greg
Play Video

The world has gone from an on-premises, highly controlled environment to a highly distributed, broad spectrum of devices. The pandemic has forced years of digital transformation on all of us in just a matter of months as we went from working from offices to working from home overnight.

There was a recent tweet by Rob Joyce, the NSA’s Cybersecurity Director that said, “Attackers put in the time to know the network and devices better than the defenders. That’s how they win.”

The weakest link in our security programs is not whether we have the right tools for our organization. The biggest risk is that we don’t deploy the tools that we own comprehensively across the environment. What good is the EDR solution if you don’t have it deployed across every asset? It doesn’t matter how fast you patch, if you don’t patch every asset. That’s why every security framework starts with an inventory of assets.

Hear Sevco’s co-founder, Greg Fitzgerald discuss this in the first video in our series.

Next week, we’ll talk about why building this inventory of assets is far harder than you realize.

Subscribe to our blog and receive periodic updates on the latest thought leadership and product updates from Sevco.

Subscribe to our blog and receive periodic updates on the latest thought leadership and product updates from Sevco.

Featured Blogs

Security

Featured: Lorem Ipsum

Why enterprises should boost their CMDB with integrated asset intelligence

Security

Featured: Lorem Ipsum

New “Dirty Pipe” Linux Bug – Are You Sure You Know Your Entire Attack Surface?

Security

Featured: Lorem Ipsum

What CISA Vulnerability Alerts Mean for Your Asset Inventory

Security

Featured: Lorem Ipsum

Video Series: Part 8 – How to Ensure a Successful IT Asset Initiative

Security

Featured: Lorem Ipsum

Video Series: Part 7 – The Impact of an Asset Inventory Initiative

Security

Featured: Lorem Ipsum

Video Series: Part 6 – Asset Telemetry

Resources and
Latest News

Security 3 min read
A CMDB is a foundational tool for managing an enterprise’s IT operations environment. They enable powerful workflows for handling a variety of business processes, such as change management, incident management, and problem management. And because they provide visibility into the interdependencies between the organization’s people, processes, applications, and IT infrastructure, CMDBs are essential for making...
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
A CMDB is a foundational tool for managing an enterprise’s IT operations environment. They enable powerful workflows for handling a variety of business processes, such as change management, incident management, and problem management. And because they provide visibility into the interdependencies between the organization’s people, processes, applications, and IT infrastructure, CMDBs are essential for making...
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.
Security 3 min read
For most organizations, the onslaught of vulnerabilities can be overwhelming. Enterprises can go line by line through the CISA list and compare it against their inventory of known IT assets, and the likelihood is that there will still be opportunities for malicious actors to access their network.