Today, we’re announcing the results of a survey recently commissioned on the state of enterprise security. Conducted by Ultimate Windows Security, the report provides visibility into the uses, concerns and challenges that IT departments face in respect to endpoint security, patching, cloud applications and mobile management.…
Read moreHT Posts
At Ivanti we like to stay in the know of all interesting and vital industry news. Explore the different security articles that are important to the IT and tech industry and give us your opinion. Let’s share ideas and learn from each other.
I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM).
In my previous post I discussed the flurry of Android vulnerabilities which have come to light over the last year or so.…
Read moreThis is the first of a three-part series on change management. In this blog, I’ll try to answer the question, “What is change management?” from both a process and a benefits (or use-case) perspective.…
Read moreOne of PayPal’s primary mechanisms to protect accounts from being hacked may have been fundamentally flawed for years.
That’s the concern raised by security researchers who uncovered a method of bypassing PayPal’s two-factor authentication (2FA), the technology that is supposed to protect your account should your username and password fall into the wrong hands.
It’s time to take a serious look at Office 365. The cloud edition of Microsoft’s broadly adopted business productivity suite – which bundles such popular packages as Microsoft Word, Microsoft Excel, Microsoft PowerPoint, and Microsoft Outlook – has been both heavily praised and heavily criticized since its introduction in 2011.…
Read moreHere we go again. New releases of Microsoft’s flagship operating system are typically greeted with a combination of angst, curiosity, confusion, and dread in equal measure.…
Read moreQuestion: With hundreds of thousands of new malware samples being analysed every day, and anti-virus software being constantly updated to combat the threat, where might a cybercriminal want to hide their trojan horse from detection?…
Read moreAll companies strive to integrate new employees as quickly and seamlessly as possible, as a smooth onboarding process allows for greater productivity and overall cost efficiency.…
Read more