Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Decoding AI: Real Threats and Misconceptions

Artificial Intelligence (AI) is more than just a trending topic; it's a groundbreaking innovation that fundamentally changes industries and society. According to a report by PwC, AI could contribute up to $15.7 trillion to the global economy by 2030, making it one of the most significant technological advancements of our time. One of the practical applications of AI that has gained traction is the use of AI prompts in creative and educational contexts.

What You Need to Know: 2024 Observability and Security Market Map

In today’s interconnected digital landscape, staying on top of market trends is essential for businesses aiming to thrive in the evolving world of observability and security. Recently, Cribl hosted a webinar to shed light on 2024 industry trends, and opportunities and challenges for both end users and vendors.. One of the notable highlights of the webinar is the convergence of observability and security, reflecting the shared data challenges faced by both IT and security teams.

Feature Friday #13: classesmatching()

Did you know you can find classes by name and tag? classesmatching() dynamically sources information from the current state. For example, let’s say you have classes representing a system’s role. Furthermore, let’s say that we want a host to only have a single role class defined. Finally, if we have more than one role class defined, then we don’t want to proceed.

What is a Checksum & How to Use One

Checksums play an important role in various fields, from data integrity verification to cyber security. They are essential tools for ensuring the accuracy and security of data transmission and storage. While exploring what a checksum is, you will discover its significant role in cyber security, how to use checksums effectively, and best practices for their implementation.

Your BYOD Policy: Key Considerations, Daren Goeson, SVP Product Management, SUEM

See more insights into creating effective and secure BYOD policies in Ivanti’s research report: Secure Unified Endpoint Management. Daren Goeson, SVP Product Management, SUEM at Ivanti explores the essential factors organizations should consider when creating Bring Your Own Device (BYOD) policies and protocols. From use cases to data management, device compatibility to security implications, this video provides valuable insights to help organizations develop effective BYOD strategies.

Harnessing AI for Cybersecurity: Beating AI Attackers at Their Own Game

In the rapidly evolving landscape of cybersecurity, AI-powered attackers are becoming increasingly sophisticated. To counter these threats, organizations must adopt advanced security technologies that leverage AI technology as part of a multi-layered approach to security.

Basic Cyber Hygiene: New Definition and Best Practices for the Current World

With the latest changes in regulations and laws, and with cyberattacks becoming more sophisticated, costly and frequent, it’s unavoidable: You must rethink basic cyber hygiene for your organization. Today, effective cyber hygiene requires you to plan and carry out regular and consistent actions to not only meet current challenges but also to keep pace with a threat landscape that is always evolving.