CMDB
IT Operations – Security Convergence: Best Practices for CMDB Success
In the ever-evolving IT landscape, the Configuration Management Database (CMDB) is a critical foundation for organizations seeking to streamline operations, inform decision-making, and enhance service delivery. However, the path to CMDB success ...
Getting the most out of your NIDS
By Jon Natkins, Product Manager, Corelight Network Intrusion Detection Systems (NIDS) are widely deployed by the most sophisticated blue teams in the world. For well-funded organizations, there is little question about the ...
Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 2
In my previous article, we discussed how organizations are shifting how IT resources are deployed and managed. We covered three methods in particular: automated image creation and deployment, immutable image deployment and ...
Climbing the Vulnerability Management Mountain: Gearing Up and Taking Step One
As I discussed in the first blog in this series, the purpose of this series is to guide you on your journey up the Vulnerability Management Mountain (VMM). Like climbing a mountain, ...