Operations | Monitoring | ITSM | DevOps | Cloud

(Full Episode) IT Horror Stories: Confessions of an Adversary Ep5 S1

In this episode, Dr. Chase Cunningham, aka DrZeroTrust, joins us to shed light on what a horror story looks like from an adversarial perspective. In drawing on his extensive red teaming and NSA background, he explores why doing the basics and applying them intelligently does matter, why people should abandon the notion of perfect security, and what controls and practices organizations can adopt and follow to make it a bad day for bad actors.

How to Overcome IT Misery with Real-Time Monitoring and Proactive Solutions

How to Overcome IT Misery: Putting an End to Constant Firefighting with Real-Time Monitoring IT professionals spend far too much time reacting to issues instead of preventing them. Join us for a discussion on how proactive monitoring with NinjaOne improves response time, decreases troubleshooting, and boosts productivity. Discover how NinjaOne’s customizable real-time monitoring empowers you to spot potential problems early and address them before they become five-alarm fires.

(Full Episode) IT Horror Stories: Last Out Ep4 S1

In this episode, information security analyst in the professional sports world, Matthew Schuster, joins host Jonathan Crowe to discuss Matthew’s harrowing IT horror story from the early days of the Covid pandemic. Matthew shares how his small but mighty team chased down and shipped out laptops to support his organization's quick transition to fully remote work (cutting a 12-month planned rollout down to just three days), how a dedicated leadership team helped his team knock it out of the park, and lessons learned from operating under pressure.

IT and Security Collaboration is the New Normal

IT and security teams have been on parallel tracks for years—each with its priorities, each speaking a slightly different language. IT focuses on uptime and performance, while security zeros in on risk mitigation and threat defense. Alignment has improved, but as cyber threats grow more sophisticated, IT and security leadership must continue working in lockstep.

Taking Control in the Endpoint Era

The unified endpoint management market is expected to grow by 22.4% between 2023 and 2030. This is due in large part to the continuing shift to remote and hybrid work models. Even now, 90 percent of organizations say they cannot manage all their endpoints. With a more mobile workforce, more laptops, tablets, and smartphones are being used on company networks than ever before. Some of these mobile devices are personal devices doing double duty as work tools.

NinjaOne 8.0 Week, Day 2: What's New with NinjaOne Documentation

Welcome to "8.0 Week," where each day we'll be looking at different new features and capabilities included in NinjaOne's latest release. This episode, we'll hear about new improvements to NinjaOne Documentation from Director of Product Management Luke Whitelock. We'll also dive into the introduction of Device Tags and how to leverage powerful new enhancements to Custom Fields.

Owning Your Success: How to Squash Impostor Syndrome

Impostor syndrome is something that seems to plague IT organizations of all shapes and sizes. No matter how long you've been in IT, or the sizes of the teams you've supported, or the projects that you've completed, it seems like everyone has a tendency to doubt their own capabilities in IT. In this stream, we brought on a few IT folks to discuss.