Rumble Blog

May 20, 2022

Employee spotlight: Ana Cruz

Meet Ana Cruz, Software Engineer at Rumble Network Discovery “Remember your accomplishments. Sometimes we focus too much on the things we’re not good at and forget about what we are good at,” said Ana Cruz who is a Software Engineer at Rumble Network Discovery. Ana joined …

Read More

May 19, 2022

Smashing Security: Knowing thy network

Podcast Description: “A man hacks his employer to prove its security sucks, Telegram provides a helping hand to the Eternity Project malware, and what the heck do mental health apps think they’re up to? All this and much much more is discussed in the latest …

Read More

May 13, 2022

Employee spotlight: Christian Colon

Meet Christian Colon, Mid-Market AE Team Lead at Rumble Network Discovery “From day one, our employees are already coming in with something to add to our overall culture. We all get a chance to voice our opinion and our leadership makes us feel heard, “ said Christian Colon …

Read More

May 12, 2022

Wrangling the May 2022 Patch Tuesday

Microsoft recently released security updates for over 70 vulnerabilities, including 3 zero-days and 7 critical vulnerabilities that affect a wide-range of their products and services. The list of patches covers an actively exploited zero-day vulnerability in the Windows …

Read More

May 10, 2022

Rumble 2.13: Sync assets & software from SentinelOne, track more cloud resources, view cross-organization inventory, and schedule automated reports

What’s new with Rumble 2.13? Sync asset and software inventory from SentinelOne Explore software identified through Rumble scans Track more cloud resources from AWS, Azure, and GCP Work with your asset inventory across organizations Schedule and email the …

Read More

May 10, 2022

Your guide to IT asset inventory management

Only 45% of organizations have mature asset management programs. Instead, most collect asset information in spreadsheets for endpoint lifecycle management. Excel and Google Sheet are the easy first step to track asset data from IT environments. Unfortunately, spreadsheets …

Read More

May 5, 2022

Finding F5 BIG-IP instances

Technology vendor F5 recently published information on over 40 vulnerabilities, mostly affecting their BIG-IP line of products. While these vulnerabilities include a mix of types and severities, a particular authentication bypass vulnerability that can affect all BIG-IP …

Read More

April 29, 2022

Finding Netatalk instances

A critical vulnerability in the Netatalk open source file server software was found in some popular network attached storage (NAS) devices. Netatalk provides services for the deprecated AFP (Apple Filing Protocol, formerly known as Appletalk Filing Protocol), and runs on a …

Read More

April 29, 2022

Your guide to IT asset discovery tools

You need to know what’s connected to your network to manage or secure it. Surprisingly, many system administrators still manually update spreadsheets to keep track of IP addresses, asset inventory, and lifecycle management. A much easier way to get an accurate picture of …

Read More

April 22, 2022

Employee spotlight: Huxley Barbee

Meet Huxley Barbee, Director of Product Marketing at Rumble Network Discovery “Marketing and cybersecurity have an inherent overlap,” said Huxley Barbee who is the Director of Product Marketing at Rumble Network Discovery. Huxley has been at Rumble since November 2021. …

Read More

Subscribe to receive email blog updates

We won't share your email. Unsubscribe at any time.