Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Your BYOD Policy: Key Considerations, Daren Goeson, SVP Product Management, SUEM

See more insights into creating effective and secure BYOD policies in Ivanti’s research report: Secure Unified Endpoint Management. Daren Goeson, SVP Product Management, SUEM at Ivanti explores the essential factors organizations should consider when creating Bring Your Own Device (BYOD) policies and protocols. From use cases to data management, device compatibility to security implications, this video provides valuable insights to help organizations develop effective BYOD strategies.

Harnessing AI for Cybersecurity: Beating AI Attackers at Their Own Game

In the rapidly evolving landscape of cybersecurity, AI-powered attackers are becoming increasingly sophisticated. To counter these threats, organizations must adopt advanced security technologies that leverage AI technology as part of a multi-layered approach to security.

Basic Cyber Hygiene: New Definition and Best Practices for the Current World

With the latest changes in regulations and laws, and with cyberattacks becoming more sophisticated, costly and frequent, it’s unavoidable: You must rethink basic cyber hygiene for your organization. Today, effective cyber hygiene requires you to plan and carry out regular and consistent actions to not only meet current challenges but also to keep pace with a threat landscape that is always evolving.

Priorities for Exposure Management, Chris Goettl, VP Security Product Management, Ivanti

See more insights into exposure management strategy and IT/security alignment in Ivanti’s research report: Secure Unified Endpoint Management. Chris Goettl, Ivanti's VP of Security Product Management shares best practices for secure unified endpoint management and explains why organizations should focus on exposure management to effectively mitigate risks.

Identity Under Siege: Safeguarding Against Threats with Expert Detection and Response

In today's digital age, our identities are under constant siege. With the proliferation of online platforms and the increasing interconnectedness of our lives, the risk of identity theft, fraud, and other malicious activities has never been higher. From personal information leaks to sophisticated cyber-attacks, the threats to our identities are diverse and ever-evolving. However, with the right knowledge and tools, we can take proactive steps to safeguard our identities against these threats. In this article, we'll explore the basic concepts of identity protection and how expert detection and response strategies can help mitigate risks.

Native and eBPF-based Kubernetes Workload Profiling for Kubernetes Clusters

System observability is an essential part of identifying performance issues within your environment because it provides a comprehensive view of how your systems are operating at a glance. Typically, observability is achieved through the collection and analysis of metrics. These metrics, generated by your applications, are deliberately incorporated by developers into the source code to offer insights into the application’s internal processes.

Data: Your Common Denominator feat. Srinivas Mukkamala, CPO, Ivanti #ivanti

Get the latest research on endpoint management and endpoint security best practices in Ivanti’s research report: Secure Unified Endpoint Management. Data silos and misaligned priorities stand in the way of IT and security teams’ ability to be efficient and innovative according to Srinivas Mukkamala, Chief Product Officer at Ivanti.

Best practices for scheduling security patching automations

In this webinar, you’ll learn about Canonical's release schedule for Ubuntu and its security updates, and how you can use this information to set optimal manual and automated security patching maintenance intervals. There are a variety of tools, such as Livepatch, Landscape, Snaps, and command line utilities like unattended-upgrades that provide security patching automation capabilities. We’ll cover how each one works, and how you can combine them for maximum benefit. We’ll also cover the nuances between reboot recommended and reboot required.