Cybersecurity—a word we hear all the time, but do you really know what it means?
The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.
Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.
Cybersecurity—a word we hear all the time, but do you really know what it means?
The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.
Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.

“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph
This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.
Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.
In this episode, you’ll learn:
Things to listen for:
[00:00 - 00:18] Intro to The Tea on Cybersecurity
[00:48 - 02:44] The definition of asset inventory and asset management
[04:06 - 04:34] Maintaining an accurate software inventory for compliance with licensing agreements
[04:34 - 05:51] Common challenges with establishing a complete asset inventory
[07:42 - 09:27] Explanation of shadow IT, traditional asset management, and cybersecurity efforts
[09:34 - 10:29] How asset management contributes to maintaining compliance.
[12:04 - 13:30] Using automated tools in asset management tasks for continuous compliance
[13:48 - 14:55] The importance of tracking all devices connected to a network
[15:23 - 17:48] Jara’s receipts
Resources:
From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets
Regular Software Updates and Patching: The Importance of Staying on Top of This
Connect with the Guest:
Connect with the host:
Connect with Trava:
Website www.travasecurity.com
Blog www.travasecurity.com/blog
LinkedIn @travasecurity
YouTube @travasecurity