Operations | Monitoring | ITSM | DevOps | Cloud

What Is a BadUSB? Understand the Threat and How to Prevent It

Lurking beneath the convenience and everyday nature of USB devices is a sophisticated cybersecurity threat known as BadUSB. BadUSB is a type of attack that leverages the reprogrammable firmware in USB devices (e.g., flash drives, keyboards, charging cables) to carry out malicious actions. Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer.

Essential Monthly Developer Updates: Security and Software Improvements

Monthly developer updates focus on critical areas like Azure vulnerabilities and Visual Studio updates. Attention is needed for the Azure Monitor agent and service fabric, especially regarding auto-update settings. With Windows 10 nearing its end of life, organizations should consider ESU support. Adobe updates address vulnerabilities in After Effects, InCopy, and Illustrator. Windows updates for versions 10 and 11 tackle various vulnerabilities, while SQL Server and SharePoint server updates are essential for security.

Your Windows 11 Migration Is Looming - but There's a Bot for That

I recently spoke with a CIO who had committed a large amount of IT resources to manually migrating computers from Windows 10 to Windows 11. The process required months of planning, device assessments, compatibility testing and hands-on coordination to avoid disruptions to day-to-day business operations. While their dedication ensured their rollout was on track for the looming Windows 11 end-of-support date, it highlighted the strain such projects place on internal teams.

Enhancing Vulnerability Management Through Exposure Management

Exposure management improves vulnerability management by integrating various attack surfaces and enhancing asset visibility. It promotes a proactive approach to continuously manage threats and exposures. Organizations define their risk appetite for quicker decision-making on vulnerabilities. A zero day response strategy enables swift action on critical vulnerabilities. Ivanti's approach includes strong asset discovery and prioritization, utilizing threat intelligence for effective risk management.

From legacy to security: Ivanti Connect Secure

When I took on leading the Network Security Group (NSG) at Ivanti in October 2024, it was a bit like a homecoming for me. You see, I spent almost two decades overseeing the development of these products before moving on to other responsibilities at Ivanti. NSG is responsible for building and maintaining Ivanti Connect Secure, Policy Secure, and Neurons for ZTNA, among other solutions.

Secure and Streamline Your Global Workforce with Ivanti's AI-Powered IT & Security Platform

Revolutionizing IT & Security: Empower Your Workforce with Ivanti’s End-to-End AI Platform Dive into the modern workplace, where complexity and security threats are on the rise. See how Ivanti’s AI-powered IT and Security platform is changing the game by managing, automating, and protecting every device on your network, while keeping your mobile, global workforce in sync and productive. Learn how Ivanti unifies your technology ecosystem, supercharges your team’s impact, and empowers them to take on bigger challenges.

Windows 11 Migration: Ivanti's Customer Zero Journey with Win11 Upgrades

Windows 11 offers enhanced security and a modern user interface, but the transition can be complex for large organizations, with logistical and employee buy-in challenges. Microsoft will end support for Windows 10 on October 14, 2025, so it's crucial to start planning and executing Windows 11 deployments now.

Apple WWDC25 Announcement of Enterprise IT Enhancements

At WWDC25, Apple announced a set of updates to simplify IT management for enterprises. These updates, spread across macOS 26, iOS 26, iPadOS 26, tvOS 26 and visionOS 26, introduce practical tools to improve device, application and user management. This article outlines the specific capabilities and how they can be applied effectively in enterprise environments.

Is Your ITSM Environment Ready for Agentic AI? Probably Not (Yet)

Agentic AI is making waves across various industries, and its potential to transform ITSM is undeniable. With all the talk about agentic AI capabilities, you are probably daydreaming about streamlining ITSM processes through automated incident management, automated change risk analysis, improved efficiency through service desk automation, or enhanced service quality with predictive maintenance. But you also may start to wonder: How real is all of this? Is my organization truly ready for agentic AI?

Patch Management Evolution #shorts

Patch Management Evolution Patch management has evolved significantly over the years, starting with early challenges and the introduction of hot fixes for bugs. Eric played a crucial role in addressing security issues, responding to urgent emails about patches. The establishment of Patch Tuesday created a reliable schedule for updates, allowing better planning. The process transitioned from weekly to monthly releases, improving patch quality and minimizing the need for reissues.

Understanding CVSS and Scanner Severity Scores in Vulnerability Management #shorts

Understanding CVSS and Scanner Severity Scores in Vulnerability Management Organizations prioritize remediation of exposures using CVSS and scanner severity scores. These scores emphasize severity over actual risk, which is tied to vulnerabilities that are actively exploited. Research shows that CVSS scores can exaggerate the criticality of vulnerabilities, leading to excessive remediation efforts. This misalignment may cause critical vulnerabilities to be rated as medium risk, leaving them unaddressed in organizations that depend solely on CVSS for prioritization.