Date | Title | Description |
01.11.2024 | API на передовой: методы противостояния кибератакам | Гайнуллина Екатерина, Security Vision
Введение
В последние годы значение безопасности API значительно возросло. С увеличением использования API и резким ростом их трафика, поверхность атаки расширилась, что сделало API одной из главных целе... |
28.10.2024 | The Double-Edged Sword of GenAI in the Life Sciences Sector | Rob Juncker, CTO of Code42 (now part of Mimecast)
It’s said that data is the lifeblood of the modern enterprise. While that’s certainly true, it’s also true that there is perhaps no industry as dependent on data – and protecting it – as the... |
04.10.2024 | Research shows workplace AI use outpaces security measures | Recent research conducted by Ivanti has highlighted a significant gap between the rise in the use of generative artificial intelligence (Gen AI) in the workplace and the preparedness of security teams to mitigate associated risks. The repor... |
03.10.2024 | GPT-4o: OpenAI’s shield against $40B deepfake threat to enterprises | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Deepfake incidents are surging in 2024, predicted to increase by 60% or more this year, pushing global cases to 1... |
30.09.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — применение EDRKillShifter для обхода EDR и антивирусной защиты, использование кода Kryptina Linux-вымогателем Mallox, критическая уязвимость в Ivanti Virtual Traffic Manager, исправление 11 уязвимостей Cisco, эволюция груп... |
24.09.2024 | With 23andMe in crisis, strengthening DNA security has never been more urgent | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
With all seven independent directors resigning from 23andMe last week, the company has become a cautionary tale o... |
17.09.2024 | Microsoft Fixes Crashes in 365 Apps Amid New Data Exfiltration Threats | In the digital landscape, stability is paramount. Microsoft recently addressed a significant issue that plagued its Microsoft 365 applications. Users of Outlook, Word, Excel, PowerPoint, and OneNote faced unexpected crashes during routine t... |
17.09.2024 | Security Week 2438: эксфильтрация данных через свист конденсаторов | Седьмого сентября исследователь Мордехай Гури опубликовал новую работу, предложив атаку PIXHELL — очередной метод эксфильтрации данных из компьютера, изолированного от Интернета и локальной сети. Гури — известный специалист по решению задач... |
16.09.2024 | The Future of Hiring: AI and Collaboration in Talent Acquisition | In the fast-paced world of talent acquisition, the stakes are high. Companies need the right people to thrive. Enter Findem and HireBrain, two innovators shaking up the hiring landscape. Their recent partnership promises to redefine how org... |
12.09.2024 | Findem and HireBrain Partner to Help Companies Hire with Unmatched Predictability and Precision | Findem and HireBrain Partner
The first simple and automated way to move from intake to job description to candidate search and engagement
SAN FRANCISCO, Sept. 12, 2024 /PRNewswire-PRWeb/ -- Findem, the only AI talent acquisition and managem... |
02.09.2024 | Published Vulnerabilities Surge by 43% in H1 2024 | A new report from Forescout reveals that published vulnerabilities increased by 43% in the first half of 2024 compared to the same period in 2023, with attackers frequently exploiting flaws in virtual private networks (VPNs) and other perim... |
29.08.2024 | Navigating the Cybersecurity Landscape: The Role of AI and Human Collaboration | In the ever-evolving world of cybersecurity, the stakes are high. Organizations face a relentless barrage of threats. Traditional security measures are crumbling under the weight of sophisticated attacks. Enter AI-driven cybersecurity. This... |
29.08.2024 | The Cybersecurity Tightrope: Balancing Risks and Responses in a Digital Age | In the digital landscape, cybersecurity is a high-wire act. One misstep can lead to catastrophic falls. Companies are grappling with a growing number of cyber threats, and the stakes have never been higher. As organizations rush to patch vu... |
26.08.2024 | How AI is helping cut the risks of breaches with patch management | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
When it comes to patching endpoints, systems and sensors across an enterprise, complacency kills.
For many IT and... |
26.08.2024 | New Emotional Footprint Report From Info-Tech Research Group Names the Top IT Service Management Providers for Boosting Cost Efficiency and Risk Management in 2024 | Based on SoftwareReviews data, the 2024 IT Service Management Emotional Footprint Report from Info-Tech Research Group showcases the leading tools that are equipping organizations with advanced decision-making capabilities to adeptly naviga... |
20.08.2024 | TuxCare’s KernelCare Enterprise Featured on Ivanti Marketplace | TuxCare PALO ALTO, CALIF., USA, August 20, 2024 /EINPresswire.com/ -- TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced that KernelCare Enterprise is now a featured solution on the Ivanti Marketplace.
... |
17.08.2024 | Microsoft’s Patch Tuesday: A Cybersecurity Wake-Up Call | In the ever-evolving landscape of cybersecurity, Microsoft’s latest Patch Tuesday update serves as a stark reminder of the vulnerabilities lurking in our digital world. This month, the tech giant addressed a staggering 88 vulnerabilities, i... |
15.08.2024 | Microsoft tackles 88 vulnerabilities in latest Patch Tuesday update | This month’s Patch Tuesday has seen Microsoft address a substantial number of vulnerabilities, as disclosed by various experts in the field.
Security researchers have highlighted seven critical and ten zero-day vulnerabilities among the 88 ... |
15.08.2024 | Record Number of Girls Taking Computing A-Level | While the number of girls taking computing A-level in 2024 increased year on year to over 3,000 students, computing science still hasn’t cracked the top ten list of A-level courses taken in England and Wales.
Computing science uptake among ... |
06.08.2024 | Verizon's Dual Role: Safeguarding Communication and Combating Cyber Threats | In a world where communication is the lifeblood of emergency response and security, Verizon has cemented its role as a guardian. Recently, the Department of Homeland Security (DHS) renewed a decade-long contract with Verizon Business, value... |
06.08.2024 | Darktrace Half-Year Threat Report 2024 Reveals Persistent Cybercrime-as-a-Service Threats Amidst Evolving Attack Landscape | Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) continue to dominate the threat landscape
Email phishing remains a top threat, with 17.8 million phishing emails detected between December 2023 and July 2024, and 62% bypassing ... |
06.08.2024 | Verizon reveals escalating risks in mobile and IoT security | 80% of responding organizations consider mobile devices critical to their operations, while 95% are actively using IoT devices
96% of critical infrastructure respondents use IoT devices, with % having experienced a significant mobile or IoT... |
31.07.2024 | Five takeaways from Forrester’s 2024 state of application security | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Application security often gets sacrificed for speed and to meet ever-tightening time-to-market windows for new a... |
18.07.2024 | How AI is closing identity and endpoint gaps that attackers exploit | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Endpoints are among the weakest yet most valuable attack vectors, and with more companies pursuing AI development... |
11.07.2024 | ICL Services и GreenData импортозаместят ESM по стандартам ITIL | Продуктово-сервисная компания ICL Services заключила партнерское соглашение с российскими ИТ-компаниями GreenData и Cleverics. В рамках сотрудничества ICL Services будет развертывать разработанное компаниями решение, ITSM/ESM-систему Altevi... |
01.07.2024 | Deepfakes will cost $40 billion by 2027 as adversarial AI gains momentum | Don’t miss OpenAI, Chevron, Nvidia, Kaiser Permanente, and Capital One leaders only at VentureBeat Transform 2024. Gain essential insights about GenAI and expand your network at this exclusive three day event. Learn More
Now one of the fast... |
07.06.2024 | Snowflake’s customer breaches make 2024 the year of the identity siege | VB Transform 2024 returns this July! Over 400 enterprise leaders will gather in San Francisco from July 9-11 to dive into the advancement of GenAI strategies and engaging in thought-provoking discussions within the community. Find out how y... |
07.06.2024 | How AI-driven identity attacks are defining the new threatscape | VB Transform 2024 returns this July! Over 400 enterprise leaders will gather in San Francisco from July 9-11 to dive into the advancement of GenAI strategies and engaging in thought-provoking discussions within the community. Find out how y... |
27.05.2024 | Is Your Organisational IT and Security Data Siloed? | Security tech firm Ivanti has released the results of its 2024 State of Cybersecurity Report. With the increasing complexity of the threats and evolution of threat-actor tactics, cybersecurity professionals are facing a constant battle to k... |
23.05.2024 | IT and security data is siloed in most organizations | Although the goals and challenges of IT and security professionals overlap, 72 percent of respondents to a new survey report that security data and IT data are siloed in their organization, contributing to elevated security risk.
The survey... |
14.05.2024 | Security Week 2420: эксплуатация уязвимостей в ПО | 7 мая исследователи «Лаборатории Касперского» опубликовали отчет со статистикой по обнаружению и эксплуатации уязвимостей в ПО. В публикации приводятся цифры за первый квартал 2024 года, по ряду параметров они сравниваются с данными с начал... |
10.05.2024 | Cisco reimagines cybersecurity at RSAC 2024 with AI and kernel-level visibility | Join us in returning to NYC on June 5th to collaborate with executive leaders in exploring comprehensive methods for auditing AI models regarding bias, performance, and ethical compliance across diverse organizations. Find out how you can a... |
09.05.2024 | Axios Event: Big Tech companies sign CISA pledge to improve security practices | figcaption>span]:font-sans">
SAN FRANCISCO – A cohort of the largest tech companies have pledged to implement and adhere to increased "secure-by-design" principles laid out by CISA as part of a new security pledge.
Why ... |
29.04.2024 | Forrester’s top 5 cybersecurity threats for 2024: Weaponized AI is the new normal | Discover how companies are responsibly integrating AI in production. This invite-only event in SF will explore the intersection of technology and business. Find out how you can attend here.
Weaponizing AI is proving to be a potent catalyst ... |
24.04.2024 | Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks | Enlarge
Getty Images reader comments 16
Hackers backed by a powerful nation-state have been exploiting two zero-day vulnerabilities in Cisco firewalls in a five-month-long campaign that breaks into government networks around the world, rese... |
23.04.2024 | Can a VPN Be Hacked? | A virtual private network is one of the easiest ways users can protect their online activity. Through what’s called a tunneling protocol, VPNs encrypt a user’s online traffic and make their data unreadable to prying eyes.
SEE: Brute Force a... |
19.04.2024 | Day of Shecurity announces April 2024 Conferences | Day of Shecurity (DOS), a leading global conference that brings together women and nonbinary people working in cybersecurity, has announced it will host its next virtual conference in the U.S. on April 25, 2024 followed by its in-person cou... |
17.04.2024 | Palo Alto Networks’ firewall bug under attack brings fresh havoc to thousands of companies | Palo Alto Networks urged companies this week to patch against a newly discovered zero-day vulnerability in one of its widely used security products after malicious hackers began exploiting the bug to break into corporate networks.
The vulne... |
17.04.2024 | Miggo Security, Interview With CEO Daniel Shechter | Daniel Shechter, CEO and co-founder of Miggo Security
Miggo Security, a Tel Aviv, Israel-based cybersecurity startup introducing an Application Detection and Response (ADR) platform, just announced the raise of $7.5m in seed funding. In con... |
15.04.2024 | TechRepublic’s Review Methodology for VPNs | At TechRepublic, we aspire to provide our readers with a fair and honest assessment of virtual private networks they may invest in. To achieve this, we believe it’s important to share how we evaluate VPNs, what criteria are used to rate eac... |
12.04.2024 | “Highly capable” hackers root corporate networks by exploiting firewall 0-day | Enlarge
Getty Images reader comments 22
Highly capable hackers are rooting multiple corporate networks by exploiting a maximum-severity zero-day vulnerability in a firewall product from Palo Alto Networks, researchers said Friday.
The vulne... |
08.04.2024 | Security Week 2415: новые уязвимости в продуктах Ivanti | 2 апреля компания Ivanti сообщила о закрытии четырех новых уязвимостей в сетевых шлюзах Ivanti Connect Secure и Ivanti Policy Secure. Из них наибольшую опасность представляет проблема, получившая идентификатор CVE-2024-21894. Ошибка в компо... |
05.04.2024 | Ivanti CEO pledges to “fundamentally transform” its hard-hit security model | Enlarge
Getty Images reader comments 43
Ivanti, the remote-access company whose remote-access products have been battered by severe exploits in recent months, has pledged a "new era," one that "fundamentally transforms the Iv... |
12.03.2024 | The Top IT Asset Management Software Vendors According to the FeaturedCustomers Winter 2024 Customer Success Report | FeaturedCustomers releases the Winter 2024 IT Asset Management Software Customer Success Report. SUNRISE, FL, USA, March 12, 2024 /EINPresswire.com/ -- Today FeaturedCustomers published the Winter 2024 IT Asset Management Software Customer ... |
10.03.2024 | CISA Systems Hacked: Ivanti Vulnerabilities Exploited, Urgent Security Measures Advised | Quincy Jon, Tech Times 10 March 2024, 10:03 am
Officials from the Cybersecurity and Infrastructure Security Agency (CISA) recently disclosed a successful hack of the agency's systems in February that involved hackers taking advantage of fla... |
06.03.2024 | Восемь опаснейших уязвимостей февраля 2024 года | Привет друзья! Я Александр Леонов, и вместе с отделом аналитиков Positive Technologies мы подготовили для вас дайджест трендовых уязвимостей за прошедший месяц.
Вы, наверно, сразу спросите: а что это за уязвимости такие — трендовые? Это опа... |
01.03.2024 | Hackers find new ways to keep targeting Ivanti | The U.S., the U.K., Canada, Australia and New Zealand warned Thursday that hackers have continued to find ways to exploit security flaws in widely used Ivanti products.
Why it matters: In their espionage campaigns, suspected Chinese hackers... |
26.01.2024 | Ivanti flaws could hurt defense contractors | Weeks into the mass exploitation of security flaws in some Ivanti VPN products, defense and intelligence officials are still trying to piece together whether hackers are burrowing into military contractors' networks.
Why it matters: Nation-... |
16.01.2024 | WEF 2024 Report: Cybersecurity at the forefront, zero trust seen as critical for trust rebuilding | The best place for the World Economic Forum (WEF) to achieve its key theme this year of rebuilding trust is to start with cybersecurity, cyber defenses, and cyber-resilience.
Their latest global cybersecurity outlook 2024 insight report del... |
05.01.2024 | Ivanti warns of critical vulnerability in its popular line of endpoint protection software | Enlarge reader comments 20
Software maker Ivanti is urging users of its end-point security product to patch a critical vulnerability that makes it possible for unauthenticated attackers to execute malicious code inside affected networks.
Th... |
28.12.2023 | Why attackers love to target misconfigured clouds and phones | Join leaders in San Francisco on January 10 for an exclusive night of networking, insights, and conversation. Request an invite here.
Data breaches tripled between 2013 and 2022, exposing 2.6 billion personal records in the past two years, ... |
14.12.2023 | Ivanti and Workato Join Forces to Enable Customers With No-Code Solutions and Third-Party Connector Library | By embedding Workato into Ivanti Neurons for ITSM, customers can swiftly create pertinent integrations using a no-code approach – leveraging a library of third-party application connectors.
Ivanti, the tech company that elevates and secures... |
08.12.2023 | Mine’s $30M boost will bring AI-based privacy to the enterprise | Join leaders in San Francisco on January 10 for an exclusive night of networking, insights, and conversation. Request an invite here.
In a turbulent year for venture capital investing, Mine countered the trend with a Series B $30 million fu... |
06.12.2023 | 36% of IT workers fearful AI will take their jobs | A study has found that 36% of IT workers are fearful that artificial intelligence (AI) will take their jobs over the next five years.
The new research compiled in a report by IT integrated solutions provider Ivanti also outlined that just 7... |
05.12.2023 | 36 percent of IT workers worry that AI will take their jobs | A new study finds that 36 percent of IT workers are very concerned that generative AI tools will take their jobs in the next five years, this is 17 points higher than for other office workers.
However, the report from Ivanti finds office wo... |
05.12.2023 | Office Workers 6x More Likely to Believe Generative AI Benefits Employers – Not Employees | Companies are racing to operationalize generative AI, but many haven’t addressed how AI-driven disruption will impact employees — who are torn between AI optimism and anxiety.
Ivanti, the tech company that elevates and secures Everywhere Wo... |
27.11.2023 | How generative AI will enhance cybersecurity in a zero-trust world | Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here.
CISOs and CIOs continue to weigh the benefits of deploying generative AI as a continuous learn... |
20.11.2023 | Edge computing and ransomware: The evolving landscape of telecom and cybersecurity
Dealing with complicated environments
Your vote of support is important to us and it helps us keep the content FREE... | The telecommunications sector is going through a period of massive change, with a significant shift toward edge computing. Simultaneously, ransomware is becoming an increasingly complicated threat.
Since 2019, ransomware has grown by 466% a... |
13.11.2023 | How generative AI is defining the future of identity access management | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Hear from top industry leaders on Nov 15. Reserve your free pass
Generative AI defines the future of identity access management (IAM) by improvin... |
02.11.2023 | The good, the bad and the scary of AI -- all in one week | AI has been very much top of the agenda this week. We've had President Biden's executive order on AI, we've had the AI Safety Summit in the UK, we've even had Collins Dictionary choosing AI as its word of the year (not to be confused with t... |
02.11.2023 | New defense tools from Abnormal Security defend against seemingly harmless QR codes | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Hear from top industry leaders on Nov 15. Reserve your free pass
The innocuous black-and-white Quick Response (QR) codes pervasive across retaile... |
18.10.2023 | How AI can help close IoT’s growing security gaps to contain ransomware | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
Nation-state attackers are fine-tuning their tradecraft to take advantage of unprotected IoT se... |
13.10.2023 | 18 Factors And Metrics To Show The Value Of Cybersecurity Initiatives | getty |
03.10.2023 | How AI-powered patch management protects remote and hybrid workers | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
Most organizations have no idea how many exposed, out-of-date endpoints they have or whether th... |
03.10.2023 | Younger employees more likely to have unsafe cybersecurity habits | A new report into hidden threats from Ivanti finds that one in three employees believe their actions do not impact their organization's security.
The research also shows that Millennial and Gen Z office workers are more likely to have unsaf... |
21.09.2023 | 63 percent of IT workers are worried AI will take their jobs | While many IT workers see the productivity benefits of AI, 56 percent believe it benefits employers more than employees. Additionally, 63 percent are concerned generative AI tools might take their job in the next five years compared to 44 p... |
21.09.2023 | 63 Percent of IT Workers and 44 Percent of Office Workers Are Concerned Generative AI Will Take Their Job in Five Years | The report also reveals the impact of poor Digital Employee Experience on workers, 57% report serious friction with work tech at least weekly and 61% say negative experiences with work tech impacts morale
Ivanti, the tech company that eleva... |
15.09.2023 | Ivanti and Catchpoint join forces to detect and mitigate against remote connectivity issues | Ivanti and Catchpoint join forces to detect and mitigate against remote connectivity issues
Ivanti, the tech company that elevates and secures Everywhere Work, and Catchpoint, the Internet Resilience company, are announcing their strategic ... |
28.08.2023 | Honeywell’s acquisition of cybersecurity provider sets sights on manufacturing sector’s deep IoT vulnerabilities | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More
The manufacturing sector is rife with unprotected Internet of Things (IoT) sensors and devices,... |
16.08.2023 | A quarter of IT professionals are considering quitting their jobs | New research released today by Ivanti shows that a quarter of IT professionals are seriously contemplating leaving their current jobs within the next six months, potentially costing US companies upwards of $145 billion dollars.
The report a... |
14.08.2023 | How FraudGPT presages the future of weaponized AI | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
FraudGPT, a new subscription-based generative AI tool for crafting malicious cyberattacks, signals a new era of attack tradecraft. Discovered by Neten... |
02.08.2023 | US, Norway say hackers have been exploiting Ivanti zero-day since April | Hackers exploited a zero-day flaw in Ivanti’s mobile endpoint management software undetected for at least three months, U.S. and Norwegian cybersecurity agencies have warned.
It was confirmed last week that hackers had compromised multiple ... |
01.08.2023 | 17 Expert Communicators Share Key Skills Comms Pros Need To Hone Today | getty |
24.07.2023 | The top 10 technologies defining the future of cybersecurity | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
CISOs face a tough balancing act. They must protect new digital transformation strategies that deliver revenue, and keep fragmented legacy systems sec... |
20.07.2023 | Designing for safety: 10 cybersecurity priorities for a zero-trust data center | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
This article is part of a VB special issue. Read the full series here: The future of the data center: Handling greater and greater demands.
Zero trust... |
20.07.2023 | Daily AI Roundup: Biggest Machine Learning, Robotic And Automation Updates 20th July 2023 | This is our AI Daily Roundup . We are covering the top updates from around the world. The updates will feature state-of-the-art capabilities in artificial intelligence (AI), Machine Learning, Robotic Process Automation, Fintech, and human-s... |
19.07.2023 | Ivanti and T-Mobile Collaborate to Offer Ivanti’s Neurons Platform to Enterprise Customers | Ivanti, the tech company that elevates and secures Everywhere Work, announced they are collaborating with T-Mobile to offer business customers the artificial intelligence and machine learning capabilities of Ivanti Neurons to secure their d... |
12.07.2023 | BlueFletch and Ivanti Wavelink Deliver Industry-First SSO for Velocity's Industrial Browser and Terminal Emulation | BlueFletch's partnership with Ivanti eliminates the daily hassles related to multiple logins, forgotten passwords, and system resets. Our combined solution is a game-changer for the industry.”
— Richard Makerson, CEO of BlueFletchATLANTA, G... |
04.07.2023 | 200+ подкастов про информационную безопасность и хакерские атаки | Привет! Мы решили сделать для вас подборку ИБ-подкастов. Это аудиоконтент с различными шоу и экспертными интервью, которые помогут прокачать профессиональные навыки, узнать последние новости, сориентироваться в индустрии и заодно прокачать ... |
26.06.2023 | 10 things every CISO needs to know about identity and access management (IAM) | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Attackers today are weaponizing generative AI to steal identities and extort millions of dollars f... |
20.06.2023 | 5 ways generative AI will help bring greater precision to cybersecurity | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Every cybersecurity vendor has a different vision of how generative AI will serve its customers, y... |
09.06.2023 | Why attackers love to target IoT devices | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Lacking designed-in security and plagued with chronic default password use, Internet of Things (IO... |
01.06.2023 | Ivanti Collaborates with Greenly to Enhance Carbon Accounting and Accelerate Sustainability Program | Ivanti, the tech company that elevates and secures Everywhere Work, is excited to announce its collaboration with Greenly, a cutting-edge carbon accounting platform. This strategic partnership is a significant milestone for Ivanti as it und... |
31.05.2023 | Experts Not Willing To Wager A Candy Bar On Their Security | Sal Viveros, Head of Global Corp Communications at Ivanti. |
29.05.2023 | The Top 10 endpoint security challenges and how to overcome them | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
One of the main reasons companies keep being breached is that they don’t know how many endpoints a... |
17.05.2023 | Predicting the future of endpoint security in a zero-trust world | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Endpoints must become more intelligent, resilient and self-healing to support the many new identit... |
15.05.2023 | 5 ways AI-driven patch management is driving the future of cybersecurity | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Patch management approaches that aren’t data-driven are breaches waiting to happen. Attackers are ... |
03.05.2023 | 10 ways ChatGPT and generative AI can strengthen zero trust | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
ChatGPT’s potential to improve cybersecurity and zero trust needs to start with the goal of learni... |
13.04.2023 | Data center dilemma: Retail CIOs seek ways to balance cost and value in 2023 | This article is part of a VB special issue. Read the full series here: Data centers in 2023: How to do more with less.
Retail CIOs and their teams face complex challenges in reducing data center costs and increasing the value their data cen... |
12.04.2023 | Defending against backdoor attacks with zero trust | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Attackers are doubling down on backdoor attacks that deliver ransomware and malware, proving that ... |
21.03.2023 | A roadmap to zero-trust maturity: 6 key insights from Forrester | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barri... |
20.03.2023 | Defining endpoint security in a zero-trust world | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Attackers strike at businesses with identity theft as their top goal. CISOs and CIOs told VentureB... |
17.03.2023 | How access management helps protect identities in the cloud | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Things are rapidly growing more challenging on the security front in 2023. Many CISOs didn’t expec... |
13.03.2023 | 14 Ways Companies End Up Overspending On Tech (And What To Do Instead) | As businesses increasingly rely on technology to improve productivity and efficiency, many companies face challenges in managing their technology expenses. While spending on the right technology tools provides a solid ROI, some companies ma... |
09.03.2023 | 21 percent of government workers don't care if their organization is hacked | With 70 percent of government workers reporting that they work virtually at least some of the time, a new survey shows some worrying trends.
The report from Ivanti finds five percent of government workers have fallen victim to a phishing at... |
08.03.2023 | Access management must get stronger in a zero-trust world | Access management (AM) done right is the fuel for successful digital transformation. Identities and AM are core to earning customers’ trust — a must for digital-first initiatives to get a strong start and deliver revenue.
AM and identities ... |
06.03.2023 | Modernizing identity access management with zero trust | CISOs tell VentureBeat they’re taking an increasingly pragmatic approach to modernizing identity access management (IAM) — and this starts with reducing legacy app and endpoint sprawl. The goal is a more efficient, economical, lean tech sta... |
02.03.2023 | Ivanti Expands Advantage Learning Services for Improved Customer Support | Ivanti integrates guided learning and expands subscription course options as part of its ongoing commitment to provide a superior customer experience.
Ivanti, the provider of the Ivanti Neurons automation platform that discovers, manages, s... |
28.02.2023 | How threat intelligence helps SecOps prevent cyberevents before they happen | CISOs tell VentureBeat they’re looking to get more value from security operations (SecOps) by identifying threats rather than analyzing them after an event. Gartner’s direction is that “SecOps’ goal is to create proactive risk understanding... |
27.02.2023 | Ivanti and Deutsche Telekom Strengthen Partnership to Provide Customers Greater Visibility, and Enhanced Security to Every Endpoint | New partnership integrates Ivanti Neurons for Discovery, Ivanti Neurons for RBVM, and Ivanti Neurons for Patch Management in Deutsche Telekom’s Mobile Enterprise Management solutions
Ivanti, the provider of the Ivanti Neurons automation pla... |