Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Choosing the Right CMS for Your Business: Factors to Consider

Are you ready to elevate your online presence and take your business to the next level? Choosing the right Content Management System (CMS) is the key to building a successful website that not only attracts visitors but also converts them into loyal customers. With countless options available in the digital landscape, it can be overwhelming to find the perfect CMS that aligns with your business goals. Fear not, as we've got you covered! In this blog post, we'll delve into the crucial factors you need to consider when selecting a CMS, empowering you to make an informed decision that fuels your business's growth. Let's get started!

Norway's Government Agencies Breached by Zero-Day Attack (CVE-2023-35078)

In a recent cyber attack that sent shockwaves through the security community, a group of hackers exploited a zero-day vulnerability, CVE-2023-35078, in Ivanti's Mobile Endpoint Management software (EPMM), compromising several Norwegian government agencies. The breach, which targeted twelve government ministries, has raised concerns about the potential risks faced by thousands of other organizations that might be vulnerable to similar attacks. Keep reading to understand the extent of the exploit.

End-to-End Risk-Based Vulnerability & Patch Management from Ivanti

Ivanti has created an end-to-end vulnerability prioritization and patching experience to automate the handoff of CVEs from security teams to IT ops. Customers can now remediate vulnerabilities more quickly and easily than ever with this risk-based vulnerability and patch management solution. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

SolarWinds Day: Secure By Design (6/28/23)

Join us for this SolarWinds Day: Secure by Design virtual event as we explore the importance of public/private partnerships to secure our common cyberinfrastructure. Hosted by SolarWinds CISO and VP of Security Tim Brown, this event includes a bipartisan panel of government leaders discussing the United States National Cybersecurity Strategy, its related frameworks, and the nature of today’s cyber risks.
Sponsored Post

The Role Of Software Asset Management In Cybersecurity Preparedness

In this article, we explore the critical role Software Asset Management plays in cybersecurity preparedness. As the threat landscape continues to evolve and malicious actors become more adept at exploiting vulnerabilities, it is essential to take a proactive approach to protect your business and its valuable assets. Our experts delve into the benefits of implementing software asset management strategies, the risks associated with neglecting it, and what you can do to optimize your cybersecurity preparedness.

We used GPT-4 during a hackathon-here's what we learned

We recently ran our first hackathon in quite some time. Over two days, our team collaborated in groups on various topics. By the end of it, we had 12 demos to share with the rest of the team. These ranged from improvements in debugging HTTP request responses to the delightful “automatic swag sharer.” Within our groups, a number of us tried integrating with OpenAI’s GPT to see what smarts we could bring to our product.

Top 4 Methods Used to Attack Networks (And How to Defend)

Threat actors use a number of different techniques to gain access to company networks so that they can deliver ransomware payloads. In this blog, we look at four of the most common techniques currently being used to attack networks. The intent is to help MSPs and IT admins understand where the threats are coming from, and then where to focus their attention in order to protect their (or their customers’) networks.