Organizations are responding to the changing cybersecurity landscape. And zero trust is at the heart of this change, with 68% of respondents saying they’re planning or actively working towards adopting a zero trust access model. In collaboration with Cybersecurity Insiders, Ivanti surveyed 421 US-based IT and cybersecurity professionals to identify the latest enterprise adoption trends, challenges, gaps and solution preferences related to zero trust security.
Data collection has become an increasingly essential tool for businesses, allowing them to gather insights about their customers and employees. But it also raises the question of ethics: what data should be collected, how should it be used and who should have access to it? In this article, we'll explore the ethical implications of collecting employee experience data through telemetry.
Android 14, Google’s latest release, brings a host of improvements for users, with enhancements to accessibility, localization, battery life improvements and more. But for IT admins, there are also several Android 14 enterprise features to plan for that enhance user privacy and control.
The information gap is broadening. According to Ivanti’s 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing incident in the last 24-months – despite virtually every organization getting phished in 2022!
The Information Technology Infrastructure Library (ITIL) Service Asset and Configuration Management process, described in its Service Transition guide, requires IT organizations to establish and maintain a configuration management database (CMDB) to keep track of configuration items (CIs) and the relationships between them. An up-to-date and functioning CMDB is one of the most important indicators of ITIL implementation success.
Accuracy in supply chain operations means so many things. There’s the obvious order accuracy in fulfillment, and all that comes with it — KPIs met, customer satisfaction ratings, etc. Every one of these is important. But there are several ways that improving accuracy affects the business, so we’re looking at how operations teams hit the target with help from voice-enabled applications.
You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance. But you might be tempted to think that October 2024 is far away, right? Think twice. After all, how can you know if you have plenty of time to prepare if you don’t know how well you currently comply with the projected regulations?
In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would: Identify your gaps with the NIS2 directive’s requirements now. Review your current supply chain security flaws. Now that we’ve discovered these security flaws, we must fix them — before time runs out in October 2024.