Operations | Monitoring | ITSM | DevOps | Cloud

InvGate

How to Build a CMDB And Map Your Entire IT Infrastructure

A Configuration Management Database (CMDB) is a database that stores all the information related to your company's IT infrastructure. This includes hardware, software, applications, contracts, users, and the relationships between them. It can also capture information such as configurations or baselines, making it easier for agents to track changes in that environment.

Governance, Risk, And Compliance (GRC): A Deep Dive Into The Framework

Governance, Risk, and Compliance or GRC are the measures we put in place to protect our organization and its people. As its name implies, it goes beyond just Risk Management. GRC builds a broader framework by incorporating governance and compliance requirements to keep organizations globally protected. Done well, it ensures we have the proper guardrails in place, meet our expected responsibilities, and protect the business from internal and external threats.

The Basics of The IT Infrastructure: Definition, Components, And Types

As IT evolves alongside both the physical and – now more common – digital workplace, so too does the IT infrastructure that sustains it. Basically, the IT infrastructure of an organization includes the whole set of IT assets that keep it operating. And, in recent years, we’ve seen a significant migration from mostly traditional infrastructure (i.e. servers and storage devices) to the more cost-effective cloud infrastructure.

10 Steps to Create a Risk Management Plan

It’s always nice to know the theory behind the practice, but sadly that’s not enough. A Risk Management plan is what will make you truly effective at avoiding risks and keeping your organization safe. Having a set of guidelines will help you map your activities, ensure the right people are held accountable, and avoid possible disruptions or fines. Don’t know where to start? Don’t worry!

ITIL & Risk Management: How Do They Relate?

ITIL and Risk Management are closely related. They're both focused on helping organizations run their IT departments efficiently and, most importantly, safely. But here's the thing. The relationship between the two hasn’t always been clearly defined. That is, until the latest version of ITIL launched in 2019. A new version of ITIL is always exciting in the IT Service Management (ITSM) world, and incorporating knowledge on dedicated Risk Management practices was a very welcomed inclusion.

New Apple Zero-Days: Patch CVE 2023-32434 and CVE 2023-32435

Apple released a series of patches today to address zero-day vulnerabilities CVE-2023-32434 and CVE-2023-32435. As Patch Management’s best practices indicate, the company advised updating the following products: iOS, iPadOS, macOS, watchOS, and Safari browser. Keep reading to understand the extent of the exploits and discover how to easily spot outdated devices on your network using InvGate Insight.

IT Asset Tagging: How to Tag Software and Hardware Assets

When managing assets across your organization, IT asset tagging acts as a starting block. It ensures that everything is properly identified and easily tracked to avoid inaccurate inventory records, unregistered losses, or misusage. The practice provides a systematic approach to label and identify software and hardware assets to easily track relevant information throughout the asset’s whole lifecycle.

CISA's BOD 23-02: How to Mitigate The Risk of Internet-Exposed Management Interfaces

The Cybersecurity and Infrastructure Security Agency (CISA) issued the Binding Operational Directive (BOD) 23-02 to mitigate the risks of internet-exposed management interfaces. For federal civilian agencies particularly, complying with this directive is not merely an operational necessity; it's a strategic imperative for securing their information systems. Keep reading to fully understand the CISA’s BOD 23-02 implications, and learn how InvGate Insight can help you comply with it.

Microsoft Teams' IDOR Lets Attackers Inject Malware Into Your Organization - Here's How to Prevent it

Cybersecurity researchers have recently informed that a vulnerability in the latest version of Microsoft Teams allows attackers to inject malware into any organization's network. Though the company has yet to release a patch, there's a change in the configuration you can do to prevent this in the meantime. The exploit was communicated by Max Corbridge and Tom Ellson from the JUMPSEC's Red Team on June 21. They promptly notified Microsoft about this security breach but didn't receive a satisfactory reply.

How to Manage an IT Asset Inventory? Outlining an ITAM Strategy

Your IT inventory is not a once-and-done thing. Assembling it is only the first part. But once you have all your organization's asset information centralized, what's next? It's all about adding details, monitoring the assets' behavior, and using the information InvGate Insight provides you with in your favor. With an IT asset inventory in place, you can do things like: Linking assets to users so you know who owns them. Tracking your investments. Automating notifications and alerts. Mapping your assets' relationships.