Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti

Privacy, Please! Why a Comprehensive Federal Framework is Essential to Protect Consumer Data Privacy

Laws vary by state. That’s expected. Fairbanks, Alaska, enacted a law prohibiting the provision of alcoholic beverages to moose, so don’t even think about it. In a part of Washington State, good luck trying to kill Bigfoot. (Not because Bigfoot doesn’t exist, but specifically because it’s illegal per a 1969 law.) But what happens when state-specific regulations are used to address a topic that transcends geographic boundaries like, say, the internet?

Phishing Attacks and Marketing Minds: How Hackers Use Unexpected Skills to Break Their Targets

In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action.

Microsoft's Coordinated Disclosure Discussion from BlackHat & DefCon '22: Security Insights

Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices for vendor coordinated disclosures of vulnerabilities for cloud versus on-prem products and much more!

The Latest Ransomware Stats Are In and It's Not Good News.

Out of 10 key metrics tracked quarterly to establish the state of ransomware activity, only one metric stayed static from Q1 to Q3 2022. The other nine all worsened. That’s an alarming trend, especially given that many business leaders hoped to see ransomware activity taper off after a historic surge during the peak of the pandemic. Ivanti, together with Cyber Security Works and Cyware, collaborated on the just-released report.

Ivanti Neurons for Patch Management

Ivanti Neurons for Patch Management enables you to prioritize and patch vulnerabilities based on active risk exposure, patch reliability, and device compliance, health and risk from a single web interface. In this video we take a firsthand look at this cloud-native patch management solution and its key features and capabilities that help you better protect against data breaches, ransomware and other threats that stem from software vulnerabilities.

Application Control for Windows

Application Control for Windows combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via Service Desk systems lighten the load for IT staff while providing users a streamlined experience.

To Thrive in the Everywhere Workplace, IT and Security Teams Need to Work Together

It’s Cybersecurity Awareness Month. For a CIO, this is like the holidays, and there’s lots to celebrate and lots to do. By reading this, you’re helping me check something off my list: I want everyone in the IT and security landscape to know how these two teams can work together for a more efficient, productive and secure enterprise. To those outside the departments, IT and security teams are often conflated.

Ivanti Neurons for Discovery

Ivanti Neurons for Discovery delivers accurate and actionable asset information in minutes. Enjoy visibility in real-time using active and passive scanning techniques and third-party connectors. In this video we take a look at this cloud-native Ivanti Neurons for Discovery solution and its key features and capabilities that help you better understand your hardware and software estate. Get the most from your asset investments, make informed decisions about the performance and health of your assets, avoid unnecessary purchases, and help to improve your security posture.