<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
  <channel>
    <title>Axonius Blog</title>
    <link>https://www.axonius.com/blog</link>
    <description>Latest blog posts from Axonius</description>
    <item>
      <title>How to detect and respond to compromised NPM packages with Axonius</title>
      <link>https://www.axonius.com/blog/how-to-address-compromised-npm-packages</link>
      <description>[object Object]</description>
      <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-to-address-compromised-npm-packages</guid>
    </item>
    <item>
      <title>Continuous Threat Exposure Management (CTEM): A guide to proactive cybersecurity</title>
      <link>https://www.axonius.com/blog/ctem-proactive-cybersecurity</link>
      <description>[object Object]</description>
      <pubDate>Tue, 11 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/ctem-proactive-cybersecurity</guid>
    </item>
    <item>
      <title>CTEM in 30 days: 10 tips for a flying start</title>
      <link>https://www.axonius.com/blog/ctem-in-30-days-10-tips</link>
      <description>[object Object]</description>
      <pubDate>Thu, 11 Sep 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/ctem-in-30-days-10-tips</guid>
    </item>
    <item>
      <title>AI in cybersecurity: Dirty data is holding back big potential</title>
      <link>https://www.axonius.com/blog/ai-in-cybersecurity-dirty-data</link>
      <description>[object Object]</description>
      <pubDate>Tue, 02 Sep 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/ai-in-cybersecurity-dirty-data</guid>
    </item>
    <item>
      <title>Security teams are ready to act. Dirty data is slowing them down.</title>
      <link>https://www.axonius.com/blog/security-teams-dirty-data-slowing-them-down</link>
      <description>[object Object]</description>
      <pubDate>Wed, 06 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/security-teams-dirty-data-slowing-them-down</guid>
    </item>
    <item>
      <title>Behind Actionability: The Axonius Asset Intelligence Pipeline</title>
      <link>https://www.axonius.com/blog/behind-actionability-the-axonius-asset-intelligence-pipeline</link>
      <description>[object Object]</description>
      <pubDate>Thu, 04 Sep 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/behind-actionability-the-axonius-asset-intelligence-pipeline</guid>
    </item>
    <item>
      <title>Five Years on the Forbes Cloud 100: A Milestone Built on a Foundation of Truth</title>
      <link>https://www.axonius.com/blog/five-years-on-the-forbes-cloud-100-a-milestone-built-on-a-foundation-of-truth</link>
      <description>[object Object]</description>
      <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/five-years-on-the-forbes-cloud-100-a-milestone-built-on-a-foundation-of-truth</guid>
    </item>
    <item>
      <title>How to reclaim excessive license costs with Axonius</title>
      <link>https://www.axonius.com/blog/reclaim-excessive-license-costs-axonius</link>
      <description>[object Object]</description>
      <pubDate>Tue, 19 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/reclaim-excessive-license-costs-axonius</guid>
    </item>
    <item>
      <title>How to improve CMDB coverage with Axonius</title>
      <link>https://www.axonius.com/blog/improve-cmdb-coverage-axonius</link>
      <description>[object Object]</description>
      <pubDate>Wed, 23 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/improve-cmdb-coverage-axonius</guid>
    </item>
    <item>
      <title>How to Detect Gaps in Endpoint Protection with Axonius</title>
      <link>https://www.axonius.com/blog/detect-gaps-endpoint-protection-axonius</link>
      <description>[object Object]</description>
      <pubDate>Mon, 02 Jun 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/detect-gaps-endpoint-protection-axonius</guid>
    </item>
    <item>
      <title>How to Track and Report Cybersecurity Metrics with Axonius</title>
      <link>https://www.axonius.com/blog/track-report-cybersecurity-metrics-axonius</link>
      <description>[object Object]</description>
      <pubDate>Thu, 27 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/track-report-cybersecurity-metrics-axonius</guid>
    </item>
    <item>
      <title>Ditch the Checkboxes: A Guide to Risk-Based Vulnerability Management</title>
      <link>https://www.axonius.com/blog/guide-risk-based-vulnerability-management</link>
      <description>[object Object]</description>
      <pubDate>Tue, 11 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/guide-risk-based-vulnerability-management</guid>
    </item>
    <item>
      <title>Zero-Day Panic? Here’s How to Decide If You Must Escalate Immediately</title>
      <link>https://www.axonius.com/blog/zero-day-vulnerability-escalation-guide</link>
      <description>[object Object]</description>
      <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/zero-day-vulnerability-escalation-guide</guid>
    </item>
    <item>
      <title>Axonius for CTEM: From validation to mobilization</title>
      <link>https://www.axonius.com/blog/axonius-for-ctem-from-validation-to-mobilization</link>
      <description>[object Object]</description>
      <pubDate>Thu, 28 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-for-ctem-from-validation-to-mobilization</guid>
    </item>
    <item>
      <title>Axonius for CTEM: From scoping to prioritization</title>
      <link>https://www.axonius.com/blog/axonius-for-ctem-scoping-to-prioritization</link>
      <description>[object Object]</description>
      <pubDate>Tue, 19 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-for-ctem-scoping-to-prioritization</guid>
    </item>
    <item>
      <title>Non-human identity management: How to govern what you can’t see or classify</title>
      <link>https://www.axonius.com/blog/non-human-identity-management</link>
      <description>[object Object]</description>
      <pubDate>Fri, 29 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/non-human-identity-management</guid>
    </item>
    <item>
      <title>Axonius FedRAMP Moderate authorization is a milestone—not the finish line</title>
      <link>https://www.axonius.com/blog/axonius-fedramp-moderate-authorization-milestone</link>
      <description>[object Object]</description>
      <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-fedramp-moderate-authorization-milestone</guid>
    </item>
    <item>
      <title>How to comply with CISA’s SCuBA (without the headaches)</title>
      <link>https://www.axonius.com/blog/comply-with-cisa-scuba</link>
      <description>[object Object]</description>
      <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/comply-with-cisa-scuba</guid>
    </item>
    <item>
      <title>Beyond the vault: Why PAM and IGA are stronger together</title>
      <link>https://www.axonius.com/blog/pam-iga-stronger-together</link>
      <description>[object Object]</description>
      <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/pam-iga-stronger-together</guid>
    </item>
    <item>
      <title>The Hidden Side of Healthcare: Why We&apos;re Acquiring Cynerio</title>
      <link>https://www.axonius.com/blog/the-hidden-side-of-healthcare-why-were-acquiring-cynerio</link>
      <description>[object Object]</description>
      <pubDate>Tue, 29 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/the-hidden-side-of-healthcare-why-were-acquiring-cynerio</guid>
    </item>
    <item>
      <title>How to detect and respond to the SharePoint ToolShell RCE (CVE-2025-53770)</title>
      <link>https://www.axonius.com/blog/cve-2025-53770</link>
      <description>[object Object]</description>
      <pubDate>Mon, 21 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cve-2025-53770</guid>
    </item>
    <item>
      <title>Identity visibility gets its own category—and it&apos;s long overdue</title>
      <link>https://www.axonius.com/blog/identity-visibility-gets-its-own-category</link>
      <description>[object Object]</description>
      <pubDate>Mon, 21 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/identity-visibility-gets-its-own-category</guid>
    </item>
    <item>
      <title>HIPAA 2025 changes: What security teams must do to stay compliant</title>
      <link>https://www.axonius.com/blog/hipaa-2025-changes-the-impact-and-how-to-address-the-new-requirements</link>
      <description>[object Object]</description>
      <pubDate>Fri, 27 Jun 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/hipaa-2025-changes-the-impact-and-how-to-address-the-new-requirements</guid>
    </item>
    <item>
      <title>Launch Week Day 3: Identities in Action</title>
      <link>https://www.axonius.com/blog/launch-week-identities-in-action</link>
      <description>[object Object]</description>
      <pubDate>Wed, 09 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/launch-week-identities-in-action</guid>
    </item>
    <item>
      <title>The real problem with identity security? Bad data.</title>
      <link>https://www.axonius.com/blog/identity-security-bad-data</link>
      <description>[object Object]</description>
      <pubDate>Tue, 08 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/identity-security-bad-data</guid>
    </item>
    <item>
      <title>Launch Week Day 2: Exposures in Action</title>
      <link>https://www.axonius.com/blog/launch-week-exposures-in-action</link>
      <description>[object Object]</description>
      <pubDate>Tue, 08 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/launch-week-exposures-in-action</guid>
    </item>
    <item>
      <title>Launch Week Day 4: Actionable UX Enhancements</title>
      <link>https://www.axonius.com/blog/launch-week-actionable-ux-enhancements</link>
      <description>[object Object]</description>
      <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/launch-week-actionable-ux-enhancements</guid>
    </item>
    <item>
      <title>Launch Week Day 1: Platform Actionability</title>
      <link>https://www.axonius.com/blog/launch-week-platform-actionability</link>
      <description>[object Object]</description>
      <pubDate>Mon, 07 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/launch-week-platform-actionability</guid>
    </item>
    <item>
      <title>CAASM is dead because it worked. What’s next is the era of Actionability.</title>
      <link>https://www.axonius.com/blog/caasm-is-dead-era-of-actionability</link>
      <description>[object Object]</description>
      <pubDate>Wed, 02 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/caasm-is-dead-era-of-actionability</guid>
    </item>
    <item>
      <title>4 best practices to beat vulnerability management burnout</title>
      <link>https://www.axonius.com/blog/best-practices-vulnerability-management-burnout</link>
      <description>[object Object]</description>
      <pubDate>Wed, 18 Jun 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/best-practices-vulnerability-management-burnout</guid>
    </item>
    <item>
      <title>From Roles to Rules: An Access Paradigm Shift</title>
      <link>https://www.axonius.com/blog/roles-to-rules-access-paradigm-shift</link>
      <description>[object Object]</description>
      <pubDate>Thu, 29 May 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/roles-to-rules-access-paradigm-shift</guid>
    </item>
    <item>
      <title>Introducing Axonius Exposures: Prioritize Security Risks That Matter From a Single Place</title>
      <link>https://www.axonius.com/blog/introducing-axonius-exposures</link>
      <description>[object Object]</description>
      <pubDate>Mon, 28 Apr 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/introducing-axonius-exposures</guid>
    </item>
    <item>
      <title>Forget What the Role Used to Be: 5 New Realities CISOs Need to Navigate</title>
      <link>https://www.axonius.com/blog/5-new-realities-ciso</link>
      <description>[object Object]</description>
      <pubDate>Wed, 30 Apr 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/5-new-realities-ciso</guid>
    </item>
    <item>
      <title>[CVE-2025-20188] Critical Vulnerability in Cisco IOS XE Wireless Controller Software</title>
      <link>https://www.axonius.com/blog/cve-2025-20188</link>
      <description>[object Object]</description>
      <pubDate>Thu, 08 May 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cve-2025-20188</guid>
    </item>
    <item>
      <title>A Technical Introduction to Axonius Exposures: Prioritize Security Risks That Matter From a Single Place</title>
      <link>https://www.axonius.com/blog/technical-introduction-axonius-exposures</link>
      <description>[object Object]</description>
      <pubDate>Thu, 08 May 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/technical-introduction-axonius-exposures</guid>
    </item>
    <item>
      <title>The ROI of Axonius: Insights from the Forrester TEI Study</title>
      <link>https://www.axonius.com/blog/roi-axonius-forrester-tei-study</link>
      <description>[object Object]</description>
      <pubDate>Tue, 06 May 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/roi-axonius-forrester-tei-study</guid>
    </item>
    <item>
      <title>We Don’t Need More Tools—We Need More Answers</title>
      <link>https://www.axonius.com/blog/we-don-t-need-more-tools-we-need-more-answers</link>
      <description>[object Object]</description>
      <pubDate>Mon, 21 Apr 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/we-don-t-need-more-tools-we-need-more-answers</guid>
    </item>
    <item>
      <title>Why the CVE Funding Crisis is a Wake-Up Call for Cyber Resilience</title>
      <link>https://www.axonius.com/blog/why-the-cve-funding-crisis-is-a-wake-up-call-for-cyber-resilience</link>
      <description>[object Object]</description>
      <pubDate>Wed, 16 Apr 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/why-the-cve-funding-crisis-is-a-wake-up-call-for-cyber-resilience</guid>
    </item>
    <item>
      <title>Presenting Cybersecurity Metrics to the Board? Say This, Not That.</title>
      <link>https://www.axonius.com/blog/presenting-cybersecurity-metrics-to-the-board</link>
      <description>[object Object]</description>
      <pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/presenting-cybersecurity-metrics-to-the-board</guid>
    </item>
    <item>
      <title>Introducing Axonius Identities: Tame the Identity Attack Surface in One Place</title>
      <link>https://www.axonius.com/blog/introducing-axonius-identities</link>
      <description>[object Object]</description>
      <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/introducing-axonius-identities</guid>
    </item>
    <item>
      <title>The Right Way to Build a Metrics-Driven Cybersecurity Program</title>
      <link>https://www.axonius.com/blog/build-metrics-driven-cybersecurity-program</link>
      <description>[object Object]</description>
      <pubDate>Wed, 19 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/build-metrics-driven-cybersecurity-program</guid>
    </item>
    <item>
      <title>Unlocking Actionability with the Axonius Asset Cloud</title>
      <link>https://www.axonius.com/blog/unlocking-actionability-with-the-axonius-asset-cloud</link>
      <description>[object Object]</description>
      <pubDate>Thu, 20 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/unlocking-actionability-with-the-axonius-asset-cloud</guid>
    </item>
    <item>
      <title>How Manufacturers Can Strengthen Cyber Resilience in 2024</title>
      <link>https://www.axonius.com/blog/how-manufacturers-can-strengthen-cyber-resilience-in-2024</link>
      <description>[object Object]</description>
      <pubDate>Tue, 13 Feb 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-manufacturers-can-strengthen-cyber-resilience-in-2024</guid>
    </item>
    <item>
      <title>The Keys to Successful Cyber Asset Attack Surface Management</title>
      <link>https://www.axonius.com/blog/axonius-federal-the-keys-to-successful-cyber-asset-attack-surface-management</link>
      <description>[object Object]</description>
      <pubDate>Fri, 10 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-federal-the-keys-to-successful-cyber-asset-attack-surface-management</guid>
    </item>
    <item>
      <title>Meet the 2024 Axonius Partner Award Winners</title>
      <link>https://www.axonius.com/blog/2024-axonius-partner-award-winners</link>
      <description>[object Object]</description>
      <pubDate>Thu, 06 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/2024-axonius-partner-award-winners</guid>
    </item>
    <item>
      <title>2025 Cybersecurity Trends (And How They’ll Impact You)</title>
      <link>https://www.axonius.com/blog/2025-cybersecurity-trends</link>
      <description>[object Object]</description>
      <pubDate>Tue, 04 Mar 2025 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/2025-cybersecurity-trends</guid>
    </item>
    <item>
      <title>The Unofficial Guide to RSAC 2024</title>
      <link>https://www.axonius.com/blog/unofficial-guide-to-rsac-2024</link>
      <description>[object Object]</description>
      <pubDate>Fri, 05 Apr 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/unofficial-guide-to-rsac-2024</guid>
    </item>
    <item>
      <title>CUPS Vulnerability: Identifying and Mitigating Risks</title>
      <link>https://www.axonius.com/blog/cups-vulnerability-identifying-and-mitigating-risks</link>
      <description>[object Object]</description>
      <pubDate>Fri, 27 Sep 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cups-vulnerability-identifying-and-mitigating-risks</guid>
    </item>
    <item>
      <title>The Toyota Camry of Cybersecurity: Axonius Wins RSAC 2019 Innovation Sandbox to Solve the Asset Management Challenge</title>
      <link>https://www.axonius.com/blog/the-toyota-camry-of-cybersecurity-axonius-wins-rsac-2019-innovation-sandbox-to-solve-the-asset-management-challenge</link>
      <description>[object Object]</description>
      <pubDate>Mon, 11 Mar 2019 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/the-toyota-camry-of-cybersecurity-axonius-wins-rsac-2019-innovation-sandbox-to-solve-the-asset-management-challenge</guid>
    </item>
    <item>
      <title>3 Ways to Solve the SaaS Security Challenge in Healthcare</title>
      <link>https://www.axonius.com/blog/3-ways-to-solve-the-saas-security-challenge-in-healthcare</link>
      <description>[object Object]</description>
      <pubDate>Tue, 03 Oct 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/3-ways-to-solve-the-saas-security-challenge-in-healthcare</guid>
    </item>
    <item>
      <title>Forbes Cloud 100, Redpoint InfraRed 100, and a Telly: Celebrating Axonius Wins</title>
      <link>https://www.axonius.com/blog/forbes-cloud-100-redpoint-infrared-100-and-a-telly-celebrating-recent-axonius-wins</link>
      <description>[object Object]</description>
      <pubDate>Tue, 22 Aug 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/forbes-cloud-100-redpoint-infrared-100-and-a-telly-celebrating-recent-axonius-wins</guid>
    </item>
    <item>
      <title>White Paper: How to Fix Asset Management for Cybersecurity</title>
      <link>https://www.axonius.com/blog/how-to-fix-asset-management-for-cybersecurity</link>
      <description>[object Object]</description>
      <pubDate>Tue, 24 Aug 2021 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-to-fix-asset-management-for-cybersecurity</guid>
    </item>
    <item>
      <title>How Axonius Helps Identify the New Curl Vulnerabilities CVE-2023-38545 and CVE-2023-38546</title>
      <link>https://www.axonius.com/blog/how-axonius-helps-identify-curl-vulnerabilities-cve-2023-38545-and-cve-2023-38546</link>
      <description>[object Object]</description>
      <pubDate>Thu, 12 Oct 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-axonius-helps-identify-curl-vulnerabilities-cve-2023-38545-and-cve-2023-38546</guid>
    </item>
    <item>
      <title>CVE-2024-3094: Using Axonius to Detect the Latest Supply Chain Compromise Affecting XZ Utilities</title>
      <link>https://www.axonius.com/blog/cve-2024-3094</link>
      <description>[object Object]</description>
      <pubDate>Sun, 31 Mar 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cve-2024-3094</guid>
    </item>
    <item>
      <title>CVE-2024-3400: Active Exploitation of Critical Vulnerability in Palo Alto Networks PAN-OS Software</title>
      <link>https://www.axonius.com/blog/cve-2024-3400</link>
      <description>[object Object]</description>
      <pubDate>Fri, 12 Apr 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cve-2024-3400</guid>
    </item>
    <item>
      <title>Zero Trust and the Constant Evolution of DOD Cyber Defense</title>
      <link>https://www.axonius.com/blog/zero-trust-and-the-constant-evolution-of-dod-cyber-defense</link>
      <description>[object Object]</description>
      <pubDate>Fri, 26 Apr 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/zero-trust-and-the-constant-evolution-of-dod-cyber-defense</guid>
    </item>
    <item>
      <title>How to Better Protect Critical Infrastructure</title>
      <link>https://www.axonius.com/blog/axonius-federal-how-to-better-protect-critical-infrastructure</link>
      <description>[object Object]</description>
      <pubDate>Wed, 01 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-federal-how-to-better-protect-critical-infrastructure</guid>
    </item>
    <item>
      <title>Axonius Software Management Extends Visibility into Your Software Apps</title>
      <link>https://www.axonius.com/blog/axonius-software-management-extends-visibility-your-software-apps</link>
      <description>[object Object]</description>
      <pubDate>Tue, 16 May 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-software-management-extends-visibility-your-software-apps</guid>
    </item>
    <item>
      <title>CMDB Reconciliation with Axonius</title>
      <link>https://www.axonius.com/blog/cmdb-reconciliation-axonius</link>
      <description>[object Object]</description>
      <pubDate>Tue, 30 May 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cmdb-reconciliation-axonius</guid>
    </item>
    <item>
      <title>Solving the Identity Management Challenge in 2024: IAM and IGA</title>
      <link>https://www.axonius.com/blog/solving-the-identity-management-challenge-in-2024-iam-and-iga</link>
      <description>[object Object]</description>
      <pubDate>Thu, 25 Jan 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/solving-the-identity-management-challenge-in-2024-iam-and-iga</guid>
    </item>
    <item>
      <title>Solving the Identity Management Challenge in 2024: ITDR</title>
      <link>https://www.axonius.com/blog/solving-the-identity-management-challenge-in-2024-itdr</link>
      <description>[object Object]</description>
      <pubDate>Thu, 14 Mar 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/solving-the-identity-management-challenge-in-2024-itdr</guid>
    </item>
    <item>
      <title>Key Takeaways from the Gartner Identity and Access Management Summit 2024</title>
      <link>https://www.axonius.com/blog/key-takeaways-from-the-gartner-identity-and-access-management-summit-2024</link>
      <description>[object Object]</description>
      <pubDate>Tue, 02 Apr 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/key-takeaways-from-the-gartner-identity-and-access-management-summit-2024</guid>
    </item>
    <item>
      <title>How Higher Education Institutions Can Build Cyber Resilience</title>
      <link>https://www.axonius.com/blog/how-higher-education-institutions-can-build-cyber-resilience</link>
      <description>[object Object]</description>
      <pubDate>Tue, 07 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-higher-education-institutions-can-build-cyber-resilience</guid>
    </item>
    <item>
      <title>A Report Template for Cybersecurity and Privacy Incident Response</title>
      <link>https://www.axonius.com/blog/a-report-template-for-cybersecurity-and-privacy-incident-response</link>
      <description>[object Object]</description>
      <pubDate>Tue, 12 Sep 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/a-report-template-for-cybersecurity-and-privacy-incident-response</guid>
    </item>
    <item>
      <title>Four Steps to Foster a Long-Term, Effective SaaS Strategy</title>
      <link>https://www.axonius.com/blog/sm-four-steps-foster-long-term-effective-saas-strategy</link>
      <description>[object Object]</description>
      <pubDate>Thu, 24 Aug 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/sm-four-steps-foster-long-term-effective-saas-strategy</guid>
    </item>
    <item>
      <title>Decoding SaaS Security in the DoD</title>
      <link>https://www.axonius.com/blog/decoding-saas-security-in-the-dod</link>
      <description>[object Object]</description>
      <pubDate>Wed, 06 Mar 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/decoding-saas-security-in-the-dod</guid>
    </item>
    <item>
      <title>Assessing the Impact of CISA’s SCuBA Framework on SaaS Security</title>
      <link>https://www.axonius.com/blog/sm-axonius-federal-assessing-the-impact-of-cisa-scuba-framework-on-saas-security</link>
      <description>[object Object]</description>
      <pubDate>Mon, 18 Sep 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/sm-axonius-federal-assessing-the-impact-of-cisa-scuba-framework-on-saas-security</guid>
    </item>
    <item>
      <title>Why Every Organization Needs a SaaS Security Strategy</title>
      <link>https://www.axonius.com/blog/sm-why-every-organization-needs-a-saas-security-strategy</link>
      <description>[object Object]</description>
      <pubDate>Wed, 18 Oct 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/sm-why-every-organization-needs-a-saas-security-strategy</guid>
    </item>
    <item>
      <title>Q&amp;A with Axonius CISO Lenny Zeltser: SaaS Ownership Complexity</title>
      <link>https://www.axonius.com/blog/sm-qa-axonius-ciso-lenny-zeltser-saas-ownership-complexity</link>
      <description>[object Object]</description>
      <pubDate>Tue, 25 Apr 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/sm-qa-axonius-ciso-lenny-zeltser-saas-ownership-complexity</guid>
    </item>
    <item>
      <title>Why CAASM and SSPM Are Emerging Technologies</title>
      <link>https://www.axonius.com/blog/why-caasm-and-sspm-are-emerging-technologies</link>
      <description>[object Object]</description>
      <pubDate>Tue, 31 Oct 2023 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/why-caasm-and-sspm-are-emerging-technologies</guid>
    </item>
    <item>
      <title>Four Security Considerations for Cloud Modernization in 2024</title>
      <link>https://www.axonius.com/blog/four-security-considerations-for-cloud-modernization-in-2024</link>
      <description>[object Object]</description>
      <pubDate>Thu, 04 Jan 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/four-security-considerations-for-cloud-modernization-in-2024</guid>
    </item>
    <item>
      <title>Launch: Axonius Cloud Asset Compliance Add-On</title>
      <link>https://www.axonius.com/blog/launch-axonius-cloud-asset-compliance-for-aws-add-on</link>
      <description>[object Object]</description>
      <pubDate>Tue, 18 Feb 2020 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/launch-axonius-cloud-asset-compliance-for-aws-add-on</guid>
    </item>
    <item>
      <title>Crowdstrike BSOD: How to identify and remediate impacted assets</title>
      <link>https://www.axonius.com/blog/crowdstrike-bsod-how-to-identify-and-remediate-impacted-assets</link>
      <description>[object Object]</description>
      <pubDate>Fri, 19 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/crowdstrike-bsod-how-to-identify-and-remediate-impacted-assets</guid>
    </item>
    <item>
      <title>Exploring the Future of SaaS with the GSA and Veterans Affairs</title>
      <link>https://www.axonius.com/blog/axonius-federal-exploring-the-future-of-saas-with-the-gsa-and-veterans-affairs</link>
      <description>[object Object]</description>
      <pubDate>Thu, 11 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-federal-exploring-the-future-of-saas-with-the-gsa-and-veterans-affairs</guid>
    </item>
    <item>
      <title>Why Zero Trust is a Priority in 2024</title>
      <link>https://www.axonius.com/blog/why-zero-trust-is-a-priority-in-2024</link>
      <description>[object Object]</description>
      <pubDate>Thu, 13 Jun 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/why-zero-trust-is-a-priority-in-2024</guid>
    </item>
    <item>
      <title>Taking the Stigma Out of Security Incidents</title>
      <link>https://www.axonius.com/blog/taking-the-stigma-out-of-security-incidents</link>
      <description>[object Object]</description>
      <pubDate>Thu, 09 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/taking-the-stigma-out-of-security-incidents</guid>
    </item>
    <item>
      <title>How to Prepare for the Next Generation of Cyber Threats</title>
      <link>https://www.axonius.com/blog/axonius-federal-how-to-prepare-for-the-next-generation-of-known-and-unknown-cyber-threats</link>
      <description>[object Object]</description>
      <pubDate>Thu, 16 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-federal-how-to-prepare-for-the-next-generation-of-known-and-unknown-cyber-threats</guid>
    </item>
    <item>
      <title>Focus and Simplification are Keys to Better Software Asset Management</title>
      <link>https://www.axonius.com/blog/axonius-federal-focus-and-simplification-are-keys-to-better-software-asset-management</link>
      <description>[object Object]</description>
      <pubDate>Tue, 21 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-federal-focus-and-simplification-are-keys-to-better-software-asset-management</guid>
    </item>
    <item>
      <title>How to Manage SaaS Sprawl</title>
      <link>https://www.axonius.com/blog/sm-how-to-manage-saas-sprawl</link>
      <description>[object Object]</description>
      <pubDate>Thu, 23 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/sm-how-to-manage-saas-sprawl</guid>
    </item>
    <item>
      <title>New Research: Why IT and security leaders are strengthening cyber resilience</title>
      <link>https://www.axonius.com/blog/new-research-why-it-and-security-leaders-are-strengthening-cyber-resilience</link>
      <description>[object Object]</description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/new-research-why-it-and-security-leaders-are-strengthening-cyber-resilience</guid>
    </item>
    <item>
      <title>Identifying and Remediating SaaS Misconfigurations</title>
      <link>https://www.axonius.com/blog/identifying-and-remediating-saas-misconfigurations</link>
      <description>[object Object]</description>
      <pubDate>Thu, 20 Jun 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/identifying-and-remediating-saas-misconfigurations</guid>
    </item>
    <item>
      <title>CVE-2024-6387: Finding &amp; Preventing the New OpenSSH Vulnerability</title>
      <link>https://www.axonius.com/blog/cve-2024-6387</link>
      <description>[object Object]</description>
      <pubDate>Tue, 02 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cve-2024-6387</guid>
    </item>
    <item>
      <title>Introducing… Humans Behind the Hoodie, Season 2: Luis Valenzuela</title>
      <link>https://www.axonius.com/blog/humans-behind-the-hoodie-season-2-luis-valenzuela</link>
      <description>[object Object]</description>
      <pubDate>Tue, 16 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/humans-behind-the-hoodie-season-2-luis-valenzuela</guid>
    </item>
    <item>
      <title>How Financial Services Organizations Can Build Cyber Resilience</title>
      <link>https://www.axonius.com/blog/how-financial-services-organizations-can-build-cyber-resilience</link>
      <description>[object Object]</description>
      <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-financial-services-organizations-can-build-cyber-resilience</guid>
    </item>
    <item>
      <title>How to ensure SaaS security compliance</title>
      <link>https://www.axonius.com/blog/how-to-ensure-saas-security-compliance</link>
      <description>[object Object]</description>
      <pubDate>Thu, 25 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-to-ensure-saas-security-compliance</guid>
    </item>
    <item>
      <title>Unofficial Guide to Black Hat USA 2024</title>
      <link>https://www.axonius.com/blog/unofficial-guide-to-black-hat-usa-2024</link>
      <description>[object Object]</description>
      <pubDate>Thu, 01 Aug 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/unofficial-guide-to-black-hat-usa-2024</guid>
    </item>
    <item>
      <title>How CISOs Are Creating Positive Relationships with Their Board</title>
      <link>https://www.axonius.com/blog/how-cisos-are-createing-positive-relationships-with-their-board</link>
      <description>[object Object]</description>
      <pubDate>Tue, 06 Aug 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/how-cisos-are-createing-positive-relationships-with-their-board</guid>
    </item>
    <item>
      <title>Axonius named a Leader in SaaS Security Posture Management (SSPM) by GigaOm</title>
      <link>https://www.axonius.com/blog/axonius-leader-gigaom-report</link>
      <description>[object Object]</description>
      <pubDate>Fri, 30 Aug 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-leader-gigaom-report</guid>
    </item>
    <item>
      <title>Introducing the Axonius Vulnerability Management Module</title>
      <link>https://www.axonius.com/blog/axonius-vulnerability-management-module</link>
      <description>[object Object]</description>
      <pubDate>Wed, 06 Jul 2022 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/axonius-vulnerability-management-module</guid>
    </item>
    <item>
      <title>Three Steps for Prioritizing Proactive Security in 2024</title>
      <link>https://www.axonius.com/blog/three-steps-for-prioritizing-proactive-security-in-2024</link>
      <description>[object Object]</description>
      <pubDate>Thu, 01 Feb 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/three-steps-for-prioritizing-proactive-security-in-2024</guid>
    </item>
    <item>
      <title>Cybersecurity KPIs: Metrics to Prioritize in 2024</title>
      <link>https://www.axonius.com/blog/cybersecurity-kpis-metrics-to-prioritize-in-2024</link>
      <description>[object Object]</description>
      <pubDate>Wed, 28 Feb 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/cybersecurity-kpis-metrics-to-prioritize-in-2024</guid>
    </item>
    <item>
      <title>$100M ARR and Beyond: Celebrating Centaur Status</title>
      <link>https://www.axonius.com/blog/100m-arr-and-beyond</link>
      <description>[object Object]</description>
      <pubDate>Tue, 05 Mar 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/100m-arr-and-beyond</guid>
    </item>
    <item>
      <title>What the New SEC Guidelines Mean for Cybersecurity Teams in 2024</title>
      <link>https://www.axonius.com/blog/what-the-new-sec-guidelines-mean-for-cybersecurity-teams-in-2024</link>
      <description>[object Object]</description>
      <pubDate>Thu, 21 Mar 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/what-the-new-sec-guidelines-mean-for-cybersecurity-teams-in-2024</guid>
    </item>
    <item>
      <title>Three Ways to Comply with the Singapore Cybersecurity Act</title>
      <link>https://www.axonius.com/blog/three-ways-to-comply-with-the-singapore-cybersecurity-act</link>
      <description>[object Object]</description>
      <pubDate>Thu, 11 Apr 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/three-ways-to-comply-with-the-singapore-cybersecurity-act</guid>
    </item>
    <item>
      <title>Understanding the EU Cyber Resilience Act</title>
      <link>https://www.axonius.com/blog/understanding-the-eu-cyber-resilience-act</link>
      <description>[object Object]</description>
      <pubDate>Tue, 09 Jul 2024 00:00:00 GMT</pubDate>
      <guid>https://www.axonius.com/blog/understanding-the-eu-cyber-resilience-act</guid>
    </item>
  </channel>
</rss>