About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Nagomi Control Brings Continuous Threat Exposure Management Into Action

Powered by Exposure Lens, The Platform Identifies What’s Truly Exposed Beyond CVEs and Drives Action at Scale

Nagomi Security today announced the next step in its platform evolution with Nagomi Control, a new release that redefines Continuous Threat Exposure Management (CTEM) by enabling security teams to shift from identifying exposures to fixing them. While CTEM has long provided a framework to identify risk, most cybersecurity programs stop at visibility. Nagomi Control fills this gap by delivering the execution layer of CTEM, enabling teams to automatically act on exposures faster, cut risk at scale, and do it with the stack they already have.

Nagomi Control debuts alongside Exposure Lens, the company’s new AI-driven intelligence engine that powers the release. Exposure Lens brings together data from assets, controls, vulnerabilities, and live threat activity to reveal where organizations are most exposed. It expands the definition of exposure beyond Common Vulnerabilities and Exposures (CVEs) to include weak configurations, missing safeguards, and unchecked access - the everyday risks attackers rely on but most tools miss. By placing these exposures in business context and ranking them by impact, Control gives security teams a clear path from awareness to resolution.

“Knowing where your exposures are is not enough, especially when the most dangerous ones aren’t tied to a CVE,” said Emanuel Salmona, co-founder and CEO of Nagomi. “For years, security teams have been flooded with vulnerability data, while critical misconfigurations, missing controls, and excessive access quietly opened the door for attackers. Nagomi Control turns that flood into focus. It makes every exposure, not just the ones with a name, actionable, trackable, and measurable, so teams can stop real threats and leaders can show progress that actually means something.”

Nagomi Control also builds accountability directly into the remediation process. Each issue is directed to the correct team and tracked within existing workflows, ensuring responsibility is clear and no step is overlooked. Progress can be measured at every level, by business unit, campaign, or threat type, giving security leaders the evidence they need to show boards and executives that exposure is being reduced. According to Gartner, 61% of security leaders reported suffering a breach in the past year due to failed or misconfigured controls, showing how urgent it is to move beyond visibility to execution.

“The majority of breaches share a common thread: the exposure was already known and could have been mitigated,” said Shai Mendel, co-founder and CPO of Nagomi. “The challenge isn’t visibility, it’s execution. Control was designed to close that gap. By delivering the execution layer of CTEM, we’re helping security teams to proactively resolve exposures faster, show measurable risk reduction, and strengthen security without adding more tools or headcount.”

New Capabilities in This Release

Nagomi Control introduces features that separate it from traditional vulnerability management and visibility-only platforms:

  • Findings: A new way to surface high-value security problems by combining exposures (misconfigurations, vulnerabilities, coverage gaps) with critical asset attributes (internet-facing, domain controller, server roles). Findings give teams a prioritized, context-rich view of risk that no scanner or asset inventory can deliver on its own.
  • Latest Changes Feed: A dynamic timeline of what’s changed across the environment, from new CVEs and threat campaigns to posture shifts and tool degradations. Each change includes full context and one-click actions, ensuring every login starts with what matters most.

Where competitors stop at lists, dashboards, or CVE scores, Nagomi connects threats, controls, assets, and vulnerabilities into a single system of record that drives remediation. To learn more about Nagomi Control and how it makes CTEM actionable, visit nagomisecurity.com.

About Nagomi Security

Nagomi Security gives enterprise security teams the control to eliminate exposure, faster and at scale. As the execution layer of Continuous Threat Exposure Management (CTEM), Nagomi unifies asset visibility, contextual prioritization, remediation guidance, and performance reporting in a single platform. At its core is Exposure Lens, the only engine that correlates assets, controls, vulnerabilities, and threats to show risk in context across subsidiaries and business units. By validating defenses and directing fixes to the right owners, Nagomi ensures issues are resolved instead of tracked, closing exposures faster, strengthening defenses continuously, and delivering measurable progress for both security and business leaders. Recognized by Gartner® as a Cool Vendor, Nagomi is a pioneer in Automated Security Control Assessment (ASCA), helping organizations operationalize exposure management and drive down risk with the tools they already own.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.