Organizations are responding to the changing cybersecurity landscape. And zero trust is at the heart of this change, with 68% of respondents saying they’re planning or actively working towards adopting a zero trust access model. In collaboration with Cybersecurity Insiders, Ivanti surveyed 421 US-based IT and cybersecurity professionals to identify the latest enterprise adoption trends, challenges, gaps and solution preferences related to zero trust security.
Data collection has become an increasingly essential tool for businesses, allowing them to gather insights about their customers and employees. But it also raises the question of ethics: what data should be collected, how should it be used and who should have access to it? In this article, we'll explore the ethical implications of collecting employee experience data through telemetry.
Android 14, Google’s latest release, brings a host of improvements for users, with enhancements to accessibility, localization, battery life improvements and more. But for IT admins, there are also several Android 14 enterprise features to plan for that enhance user privacy and control.
The information gap is broadening. According to Ivanti’s 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing incident in the last 24-months – despite virtually every organization getting phished in 2022!
The Information Technology Infrastructure Library (ITIL) Service Asset and Configuration Management process, described in its Service Transition guide, requires IT organizations to establish and maintain a configuration management database (CMDB) to keep track of configuration items (CIs) and the relationships between them. An up-to-date and functioning CMDB is one of the most important indicators of ITIL implementation success.