Operations | Monitoring | ITSM | DevOps | Cloud

ITAM strategies to secure BYOD, Daniel Spicer, CSO, Ivanti

How can IT and security teams get better visibility into devices and endpoints that are accessing their network? Ivanti’s latest research report, “Securing the Borderless Digital Landscape” (ivanti.com/borderless-security) found that poor device visibility and unmanaged BYOD are prime attack vectors for threat actors.

Strengthen your mobile security with Ivanti Neurons for MDM and MTD

Mobile security is crucial as smartphones become prime targets for cyber attackers. The shift from desktop to mobile usage has increased vulnerabilities, especially during the COVID pandemic. Key statistics show a rise in mobile phishing attacks and risks from unsecured connections and risky apps. The session highlights the need for mobile threat defense solutions and user education to balance comfort and security.

Unlocking IT Support: Expert Assistance When You Need It

Users often require support beyond self-service options. The technical support team acts like an emergency room, prioritizing urgent needs and aiming for quick resolutions. Ivanti's experts tackle issues at their source, providing both immediate fixes and long-term strategies. An intelligent routing system connects users with the most qualified engineers, ensuring effective support and maximizing the potential of IT and security solutions.

What does risk appetite mean?

Defining your risk appetite – the level of risk your organization is willing to accept – is one of the most important steps to adopting an exposure management strategy. If your risk posture’s out of line with your risk appetite, it’s time to take action. Ivanti’s Chris Goettl breaks down defining your risk appetite and how it helps you make informed decisions about remediating vulnerabilities.

Apple's Latest Software Updates and Security Highlights #shorts

Apple's Latest Software Updates and Security Highlights Apple announces updates for major operating systems, introducing a new naming convention with Mac OS 26. A significant CVE 43 300 is noted. Updates for third-party applications such as Chrome, Docker, Firefox, and Edge focus on addressing vulnerabilities. Thunderbird also receives an update to version 1.42. The month features a couple of zero days alongside regular updates for third-party applications.

Is Your Patch Process Hurting End Users' Experience? Here's How to Fix It

Just one bad patch can cause key systems to fail, disrupting your teams and, ultimately, your customer experience. While I was checking out at a supermarket self-service machine, the screen suddenly froze and then dreaded blue screen of death appeared. A nearby staff member quickly came over and, with a bit of a sigh, said it was the third time that day this happened. While I’ll never know for certain whether a patch was the only cause, businesses want to minimize these types of issues.

Understanding Linux Vulnerabilities and Their Impact

Understanding Linux Vulnerabilities and Their Impact Linux vulnerabilities pose significant risks, particularly CVE 20258067, which has active exploits in rebased distributions. CVE 202332256 enables remote attackers to access sensitive information without authentication. Additionally, CVE 202558367 presents a denial of service and remote code execution risk in the Delta class. Applications handling untrusted user input to Delta need careful scrutiny, and it is crucial to keep systems updated to mitigate these threats.

Drift Data Breaches #shorts

Drift Data Breaches Recent security incidents reveal attacks on Drift and the theft of Salesforce data. Affected vendors like CloudFlare provide guidance and outline their responses. CloudFlare shares breach details, including a timeline and customer recommendations. Organizations are advised to disconnect applications, rotate credentials, and adhere to security best practices. Emphasis is placed on implementing resilience strategies to better prepare for future incidents.

Schrödinger's Vulnerability: Why Continuous Vulnerability Management Isn't Optional

The classic thought experiment known as Schrödinger’s Cat imagines a cat that’s simultaneously alive and dead; that is, until someone opens the box. In other words, it’s both alive and dead until the point that we can confirm the truth. Now, swap the cat for software vulnerabilities, and you’ve got a fantastic analogy for what happens in today’s security environment.