Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Asset Management, Device Management and related technologies.

Tech debt and mutual accountability, Dennis Kozak, CEO, Ivanti

Why is such a critical security concern for most organizations? And why are customers and vendors divided over who is responsible for software security? Ivanti CEO Dennis Kozak shares original research from Ivanti’s 2025 State of Cybersecurity Report (report link: ivanti.com/stateofcyber) addressing the significant challenge of tech debt and its impact on cybersecurity.

Unifying risk and business strategy, Karl Triebes, CPO, Ivanti

How do we break down silos between security and IT and move to an all-encompassing, unified view of risk? Karl Triebes, Ivanti Chief Product Officer, shares original research from Ivanti’s 2025 State of Cybersecurity Report (report link: ivanti.com/stateofcyber) highlighting how security and IT silos undermine organizations’ cybersecurity postures and make it difficult to identify and prioritize risk.

Essential Software Updates for Security

Essential Software Updates for Security Critical vulnerabilities in Chrome, Adobe products and Microsoft software are addressed through recent updates. Chrome's zero-day vulnerability is particularly noted. Adobe Acrobat and Reader fix nine vulnerabilities, while Windows 11 resolves 36, including five zero-days. Microsoft Office updates tackle ten vulnerabilities across various applications.

IT Horror Stories: Dead in the Water Ep2 S1

In this episode, Jay Abbott, Director of IT at NinjaOne, joins host Jonathan Crowe to share a harrowing tale from Jay’s early days managing infrastructure in oil and gas. The two discuss how a bad virus definition file ended up BSOD’ing an entire endpoint fleet, how Jay and his team rose to (and ultimately resolved) the task at hand, and how to plan for the unexpected in a world where “the best laid plans of mice and men often go astray.”

25+ Best IT Asset Management Software Options in 2025

Finding an IT Asset Management (ITAM) tool can quickly become a headache. With so many ITAM tools on the market, navigating their specifics, potential, and features can be a slow and sometimes confusing process. If you’re in this situation and need some clarity in your search process, don’t worry. We’ve done the homework for you.

AI Incident Summarization in 50 Seconds

Ivanti's AI Incident Summarization feature lets your IT team catch up on the history of a given incident at the speed of GenAI, so they can help your end users solve their problems that much faster. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Custom Field Speedrun: Personalize Your IT Workflow in Under an Hour

Want to speed up your IT workflow? Custom fields in NinjaOne let you track device and user data so you can improve visibility, automate operations, and stay in control. Join our NinjaOne Speedrun webinar with Field CTO Jeff Hunter and learn how to quickly harness custom fields to automate, customize, and optimize your IT operations. In this session, you’ll learn how to: By the end of this session, you’ll know exactly how to transform your NinjaOne instance in 60 minutes or less. Ready to put your IT environment on autopilot? The clock is ticking.

AI Incident Summarization in 50 Seconds

Ivanti's AI Incident Summarization feature lets your IT team catch up on the history of a given incident at the speed of GenAI, so they can help your end users solve their problems that much faster. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Why the Common Vulnerability Scoring System (CVSS) Is Necessary - But Also Insufficient

Measuring the risks posed by vulnerabilities — to the greatest degree of accuracy — is no simple task. It’s common for organizations to use the Common Vulnerability Scoring System (CVSS) by default, to come to terms with the size and scope of vulnerabilities. But while CVSS is a useful tool, it’s not immune from its own vulnerabilities.