Kategorie: CyberSecurity
Meltdown and Spectre: What you need to know! — The...
Jan 20, 2018 | CyberSecurity, Enterprise, ITAM, ITSM, OTOM, Tools |
ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 2 of 2 — Ivanti Blog
Okt 13, 2019 | Best Practices, Business, CyberSecurity, ITAM, ITSM |
As mentioned in Part 1 of this blog series, IT Service Management (ITSM) and IT Asset Management (ITAM) make a great combo to support IT’s overall plan to maximize operational efficiencies and improve service delivery, while...
WeiterlesenITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 1 of 2 — Ivanti Blog
Okt 13, 2019 | Best Practices, Cloud, CyberSecurity, ITAM, ITSM |
Actor 1: “Hey, you got peanut butter on my chocolate.” Actor 2: “Well you got chocolate in my peanut butter.” This 1970’s ad campaign of “Two Great Tastes that Taste Great Together” put Reese’s Peanut Butter Cups on the map. 842...
WeiterlesenResponsible Disclosure? Google veröffentlicht ungepatchte Win-10-Lücke — heise online News
Apr 24, 2018 | CyberSecurity, Enterprise, ITAM |
Zum wiederholten Mal hat Googles Project-Zero-Team eine Windows-Sicherheitslücke veröffentlicht, für die noch keine Patches bereitstehen. Sie ist allerdings nicht aus der Ferne und nur unter eng definierten...
WeiterlesenTake Security to the Next Level With the Top 5 CIS Critical Security Controls — The Leading IT Management Blog | Ivanti
Mrz 4, 2018 | Best Practices, CyberSecurity, Inventory, ITAM, ITSM, OTOM |
Take Security to the Next Level With the Top 5 CIS Critical Security Controls — The Leading IT Management Blog | IvantiTo make a focused security strategy your organization’s reality, you need a strong security framework. When...
WeiterlesenMalware Protection Against Today’s Extreme Cybersecurity Threats — The Leading IT Management Blog | Ivanti
Feb 25, 2018 | Business, CyberSecurity, Enterprise, ITAM, Tools |
Malware Protection Against Today’s Extreme Cybersecurity Threats — The Leading IT Management Blog...
WeiterlesenThe User: Always Your Weakest Link — The Leading IT Management Blog | Ivanti
Feb 25, 2018 | CyberSecurity, Enterprise, ITAM |
The Verizon Data Breach Investigations Report (DBIR) is one of the most respected annual reports in the security industry. Every year, the Verizon Research, Investigations, Solutions and Knowledge (RISK) 554 weitere Wörter über...
Weiterlesen10 Things You Shouldn’t Include in Your Security Awareness Training Program — Spiceworks Community
Feb 3, 2018 | CyberSecurity, ITAM, OTAM, OTOM |
If you want to succeed with your organization’s security awareness program, here are some of the top „faux-pas“ you should be sure to avoid. Here are some of the errors we have seen over the years that you do...
WeiterlesenMalware Protection Against Today’s Extreme Cybersecurity Threats — The Leading IT Management Blog | Ivanti
Feb 3, 2018 | CyberSecurity, Enterprise, ITAM, OTOM, Tools |
Malware Protection Against Today’s Extreme Cybersecurity Threats — The Leading IT Management Blog | IvantiMalware protection is more important today than ever since cybersecurity threats are on the rise. No great surprise there,...
WeiterlesenProcessor flaws cause Cyber Security panic, What can ITAM do to help? – first appeared on ITAMREVIEW
first appeared at THE ITAM REVIEW Jan 30th, 2018 · 0 Comment Spectre and Meltdown, two major CPU based vulnerabilities recently discovered by Google’s “Project Zero” team, have caused quite the stir over the first couple of...
WeiterlesenAlphabet’s new security company wants to help ‘the good guys’ fight cybercrime — The Next Web
Jan 31, 2018 | Cloud, CyberSecurity, Enterprise, ITAM, Tools |
Google’s parent company, Alphabet, has started a new firm called Chronicle to help large enterprises protect themselves from cyberattacks. According to CEO Stephen Gillett, it’s the high volume of security threats that’s most...
WeiterlesenRansomware, The Cyberthreat That Keeps On Growing #Infographic — Visualistan
Jan 31, 2018 | Asset Tracking, Best Practices, Business, CyberSecurity, Enterprise, Infographics, ITAM, OTOM |
Ransomware is the cyberthreat that shows no signs of slowing down. The malicious malware has seen a resurgence in recent years, with 2016 dubbed ‘the year of Ransomware’ and the worldwide WannaCry and Petya/NotPetya attacks in...
WeiterlesenAlphabet’s new security company wants to help ‘the good guys’ fight cybercrime — The Next Web
Jan 25, 2018 | Business, Cloud, CyberSecurity, Enterprise, ITAM, Tools |
Google’s parent company, Alphabet, has started a new firm called Chronicle to help large enterprises protect themselves from cyberattacks. According to CEO Stephen Gillett, it’s the high volume of security threats that’s most...
Weiterlesen
Kategorien
- Asset Tracking (13)
- Azure (2)
- Best Practices (52)
- BI (6)
- Business (36)
- Cloud (15)
- CyberSecurity (16)
- DATA (20)
- Deployment (10)
- Enterprise (56)
- Infographics (1)
- Inventory (21)
- ISO (5)
- ITAM (88)
- ITSM (13)
- Lizenzmanagment (33)
- Office365 (12)
- OTAM (2)
- OTOM (8)
- SAM (52)
- Tools (49)
- Uncategorized (8)