In a series of blog posts in April, we detailed the many tools used in security and endpoint management, why consolidation is needed, and why it makes sense to leverage…
In a previous post, we detailed the vast array of endpoints a typical enterprise possesses, why having too many devices can open the door to malicious cyber actors, and the…
In Part Two of this series, we highlighted that the more tools there are in place for IT management and security, the less secure the enterprise becomes. Those with more…
In Part One of this series, we laid out the extent of tool sprawl in the enterprise. According to a recent Enterprise Strategy Group (ESG) survey, two thirds of enterprises…
Sprawl happens in many ways. Urban sprawl is common in major metro areas. The City of Los Angeles takes up about 500 square miles. But greater LA now comprises more…
IT and security management have so many facets and nuances that most organizations are running dozens of different cybersecurity applications and tools. To stay on top of things, IT hops…
Microsoft releases 38 fixes this month including 7 Critical and 1 Weaponised Threat There are 7 Critical and 31 Important fixes this month. Microsoft Windows, Windows Components, Office and Office Components, SharePoint…
April was a busy month, especially with RSA Conference taking up a whole week. We didn’t want to miss out on highlighting some critical information on third-party patches, though, so…
Modern enterprises are more vulnerable than ever. Whether due to ransomware attacks, phishing scams, or just not being able to patch quickly enough, malicious hackers are constantly probing networks and…
Enterprises are struggling to manage and reduce their organizational attack surface, especially with a shortage of skilled staff. Find out how some security executives are tackling this challenge by automating…