Discover how our solutions have empowered organizations to overcome challenges, achieve operational excellence, and drive transformative growth. Learn from real-world success stories.
Februaryâs Patch Tuesday is undoubtedly headlined by three zero-days and several important vulnerabilities in Microsoft Exchange Server that allow remote code execution for authenticated attackers. Nothing has been exploited yet, but itâs a fairly safe bet that will be.
Read BlogIT organizations are prioritizing efficiency, security, and adaptability in a fast-paced industry, as usual. But staying competitive not only requires adopting emerging best practices but also moving away from outdated processes. In this blog, you'll get an outline of key IT practices shaping the fu
Read BlogAutomox, the cloud-native IT operations platform for modern organizations, today announced its authorization as a CVE (Common Vulnerabilities and Exposures) Numbering Authority (CNA).
Read BlogAugust 2024âs Patch Tuesday has landed and this month we see 86 vulnerabilities and 6 Zero-Days. Among the big bundle of vulnerabilities, youâll find exploits like CVE 2024-38180, CVE 2024-38133, and CVE 2024-38199. The inclusion of these particular vulnerabilities underscores the need for immedi
Read BlogAnyDesk Software GmbH recently announced their production systems were compromised and that they are revoking code signing certificates prior to AnyDesk Windows version 8.0.8. As a best practice, whenever a code signing certificate is compromised, any executable in your environment signed with that
Read BlogAs a SaaS provider, youâve got some pretty big shoes to fill. Youâve got to keep your customers happy and secure while keeping your costs down and staff productive. To help you with that, letâs start by naming three things that are extremely important for SaaS IT teams:
Read BlogWhether youâre navigating a website, submitting an online form, or exploring an app that identifies your newest houseplant, the requirements to deem a tool user-friendly are often the same.
Read BlogThe automation landscape is all about reclaiming your time to focus on meaningful work.
Read BlogSecuring your endpoints is important in todayâs digital world. Automox worklets provide an ultimate shield against cyber threats, making it easy to protect your digital fortress.
Read BlogWith all the IT developments 2023 delivered, itâs clear thereâs no stopping change. It really is the only constant. But in IT, we thrive on change. Reflecting on the past year and its major changes, Automox experts are excited to see what the 2024 IT landscape has in store.
Read BlogThis Worklet removes Windows user profiles older than the provided age threshold
Read BlogIf youâre a sysadmin, it's probably no shocker to read about the pains of vulnerability detection and remediation.
Read BlogSecuring your endpoints isnât just a top priority for IT pros, but also for anyone who takes their online safety seriously.
Read BlogDefinition, Impact, and Best Practices for Patching
Read BlogIn the current digital landscape, organizations face the constant challenge of stabilizing security and accelerating the productivity of their IT systems. As such, timely patching is critical.
Read BlogIn the infosec world, abbreviations and acronyms abound. But what do they all mean? In this blog post, we'll go over the differences between some commonly confused acronyms â namely, CVE, CWE, CVSS, and CWSS.
Read BlogIn IT, both phrases ring true. These turns of phrase can conjure feelings of stress when you canât address your data or view all your endpoints from a single lens.
Read BlogOur team has been hustling all month to crank out useful Worklets so you can automate any task, on any endpoint. Visit the Worklet Catalog to discover plug-and-play IT automations for hundreds of use cases across Windows, macOS, and Linux devices.
Read BlogIT teams need to move faster and faster to keep up with new technologies, stay ahead of vulnerabilities, and drive productivity. Not only that, but having a team large enough to keep up with time consuming day-to-day tasks can be a challenge.
Read BlogIf youâre in the IT space, youâll hardly recollect December 2021 as the season for cheer, with the Apache Log4j vulnerability discovery causing shockwaves in the IT community. The finding is perhaps the most well-documented zero-day vulnerability in recent years, with a massive impact vector because
Read BlogVulnerability management refers to the process of discovering, identifying, cataloging, remediating, and mitigating vulnerabilities found in software or hardware. Patch management refers to the process of identifying, testing, deploying, and verifying patches for operating systems and applications f
Read BlogRegular and consistent patching is critical to ensuring every endpoint is up-to-date and compliant with your corporate policies. Speed is also of the essence for patch management to ensure you can secure your endpoints faster than they can be exploited. Finding an efficient way to patch both servers
Read BlogThe Cyber Essentials and Cyber Essentials Plus certifications are helpful tools for bettering your organisationâs cybersecurity strategy and protecting your IT infrastructure against cyber threats. With automated endpoint management, Automox makes it easy to patch, configure, control, and secure you
Read BlogRegular and consistent patching is critical to ensuring every endpoint is up-to-date and compliant with your corporate policies. Speed is also of the essence for patch management to ensure you can secure your endpoints faster than they can be exploited. Finding an efficient way to patch both servers
Read BlogWeâve only cleared the first few months of the year, but IT teams are already feeling the heat. With nearly 100 vulnerabilities patched by Microsoft in January and companies worldwide preparing for budget reductions and workforce layoffs, 2023 looks like a tough year for IT admins and IT Operations
Read BlogThese are days of limited time and resources. Everything moves so fast and it can be hard for schools or local government organizations to stay on top of ever-changing financial and IT operational landscapes. The 2023 State of IT Operations Survey results indicate that IT operations teams in stat
Read BlogExperts Weigh in on April 2023 Patch Tuesday Release
Read BlogWhen youâre racing to block bad actors before they can exploit your vulnerabilities, youâve got to be able to put the proverbial pedal to the metal. When it comes to making sure endpoints are up to date and secure, your organizationâs patch efforts shouldnât be a âwhen we can get to itâ priority. Th
Read BlogWe have confirmation that malicious versions of both Windows and macOS of the 3CX Desktop App are being deployed via trojanized updates. However, the application is available for Linux and mobile systems as well. While the desktop applications for those platforms are not known to be compromised, we
Read BlogAutomation increases IT agility and allows you to simplify IT management in the modern workplace. Over half of IT professionals cite their top three reasons for increasing automation as improved security posture, more control across all endpoints, and reduced cost of IT operations.
Read BlogIf youâre in software development, you may know dynamic memory allocation and management can be a mixed bag. Although memory management within modern software has improved by leaps and bounds, the allocation and release of system memory resources can vary greatly.
Read BlogWeâve only cleared the first few months of the year, but IT teams are already feeling the heat. With nearly 100 vulnerabilities patched by Microsoft this year alone, coupled with companies worldwide preparing for budget reductions and workforce layoffs, 2023 looks like a tough year for IT admins and
Read BlogSecurity teams can feel overwhelmed and disillusioned as they grapple with masses of alerts amid increasing threats from sophisticated cyber attackers. In particular, enterprises that reacted fast in response to global lockdowns need automation to help bolster their security efforts. But there are w
Read BlogYet another development has sprung from the recent Lastpass breach saga, this time itâs encryption keys for customer vault backups that were stolen from a Senior DevOps employee, one of only four with
Read BlogFollowing vulnerability and patch management, best practices should be a goal for organizations of every size. Vulnerability management refers to the process of discovering, identifying, cataloging, remediating, and mitigating vulnerabilities found in software or hardware, while patch management ref
Read BlogThe team here at Automox recently shared their predictions for the coming year in 9 IT Trends Set to Rock the Boat. Our thought leaders anticipated that organizations with cloud-based infrastructure would accomplish more with less than on-prem deployments. Where legacy on-prem solutions are fraught
Read BlogIf youâre anything like me, you know what needs to be done around the office, so to speak, but can barely find the time to make it all happen. So, we look for tools and resources that can help us get the job done, and even if the outcome isnât 100% what we envisioned, we still delivered! Iâd alwa
Read BlogIf youâve visited this blog before, you know how important patch management is to infrastructure upkeep and security. However, for many teams, developing an effective strategy to deal with outstanding patches can take a back seat to more strategic business matters. The thing is, patch management nee
Read BlogFebruaryâs Patch Tuesday is undoubtedly headlined by three zero-days and several important vulnerabilities in Microsoft Exchange Server that allow remote code execution for authenticated attackers. Nothing has been exploited yet, but itâs a fairly safe bet that will be.
Read BlogOver the past several years, modern businesses have been migrating to cloud service providers to take advantage of lower costs, ease of use, and scalability. And according to recent analyst predictions, those trends arenât changing. To help your team adapt your patching strategy accordingly, weâve c
Read BlogAlright, as we make it through the thick of the December holidays, itâs always good to take stock of what youâve learned, accomplished, and how you can improve your work in the coming days. When we look back on the year, one of the projects weâre most grateful for is our How We Worklet series. Th
Read BlogBoulder, Colo., â December 21, 2022 â AutomoxÂź, the cloud-native IT operations provider, today announced a series of recognitions from respected third-party software marketplace, G2. Automox received six total awards as part of G2âs Winter 2023 recognition cycle.
Read BlogIT teams can accelerate their businessâs growth by enabling staff to do more with fewer resources. And in today's digital world, organizations must strategize IT initiatives to stay relevant within a landscape of ever-evolving tech. That said, it can be a challenge for teams to reinforce the valu
Read BlogThe holidays can be a magical time. From Thanksgiving through December each year, there are more reasons to meet friends and family for cocktails or cozy nights in, share time-tested recipes, or tune into any great number of holiday flicks (Love, Actually, Die Hard, The Ref â choose your adventure).
Read BlogItâs been a long year, hasnât it? A long few years, in fact. But weâve learned a great deal from our most recent challenges. These days, weâre all experts when it comes to changing plans on a dime, adjusting expectations midflight, and recognizing the differences between distraction and more fruitfu
Read BlogAs your organization grows and becomes increasingly multi-faceted, managing the day-to-day operations of business, IT, and security manually can get more and more challenging. If you have limited resources, time, staff, or other limitations, automation and operational tooling help you get more do
Read BlogAuthentication and access controls play a crucial role in web application and system security. If these controls are weak or inconsistent, it can create a vulnerability threat actors can easily exploit via an authentication bypass. What is authentication bypass?
Read BlogWeâre often asked when Automox is the better choice than WSUS. Of course, weâre biased, so we say âalwaysâ. But the reality is that some choose to run both WSUS and Automox together, to get the best of both worlds. Hereâs what that can look like.
Read BlogAsking for funding during a financial upswing can be awkward and uncomfortable. Asking for budget in uncertain financial times? Buckle up, itâs going to be a bumpy ride! Use this go-to checklist to cover your bases so your request stands out and gets approved, even when dollars are scarce.
Read BlogAutomated Cross-OS Patching Say goodbye to manual patching. Automatically patch your Windows, macOs, and Linux devices with one easy to use platform.
Read Blog100 cybersecurity startups with $100 million or more in VC funding over the past two years
Read BlogEvery single day, IT and helpdesk teams are bombarded with a multitude of tickets. Their goal is generally to keep end users happy and the businesses they work for productive. Typically, this requires a hybrid approach of automation and manual work. Some issues are frequent offenders that can be
Read BlogAutomation brings opportunities galore to IT teams everywhere. And these teams are quickly learning to use automated solutions to manage demand due to staff scarcity and diminishing budgetary resources. IT divisions are also discovering that automation assists with speeding up processes and incre
Read BlogWhile many expect 2023 to be all about growth with much of the pandemic and remote workforce expansion behind us, current economic uncertainties, supply chain crises, and a shrinking pool of skilled resources have prioritized trends on which we werenât focused. We do ourselves a great favor to th
Read BlogYouâve heard it before: Sometimes, you have to look back to move forward. From a cybersecurity perspective, this phrase goes a long way when studying Common Vulnerabilities and Exposures (CVEs). CVEs have been a pillar in our industry for decades, but how did we get here, what new trends are d
Read BlogTuesday, October 25, 2022, the OpenSSL project team announced that OpenSSL version 3.0.7 will be released on Tuesday, November 1. The release will include a fix for a critical, security-related vulnerability in OpenSSL versions 3.0 forward. This vulnerability may have existed since September of last
Read BlogWhat is patch management? Patch management is the process in which security and/or IT teams identify and apply software or system patches to their organizationâs endpoints when new patches or updates become available. Patch management best practices refer to processes and tasks that align with a pr
Read BlogOn October 17, 2022, Researcher Alvaro Munoz discovered a vulnerability in the Apache Commons Text. The vulnerability, CVE-2022-42889, is a CVSSv3 9.8 and is present in Apache Common Text 1.5 through 1.9. Proof-of-Concept code walking through the vulnerability is already available.
Read BlogLinux Kernel WLAN Remote Code Execution Vulnerabilities On October 13, security researcher Sönke Huster of TU-Darmstadt introduced a POC detailing several CVEs, including CVE-2022-42719 and CVE-2022-42720. Both are remote code execution (RCE) vulnerabilities in the Linux kernel WiFi stack present f
Read BlogItâs our favorite time of year again â the leaves are changing, the weather is cooling down, and itâs officially Cybersecurity Awareness Month! With a somewhat frightening economic climate, budget cuts, understaffing, and constant news about massive data breaches, the current landscape could be str
Read BlogAs we all start transitioning into post-COVID life, a lot of brainpower is going into figuring out where we should be doing our work. Do organizations stay the course of the past year and fully commit to distributed work (like we did at Automox)? Or request that employees return to the office once i
Read BlogIn the last year or so, it seems like the wave of companies transitioning their tools to the cloud has skyrocketed, doesnât it? 92% of enterprises have a multi-cloud strategy. That means that IT teams are left with a buffet of software in different clouds to deploy and maintain. The new world of
Read BlogWhat does it take to keep your endpoints configured and secured? Sometimes, this question can seem elusive and you may not always know where to start. To help you get a hold of your security environment and to protect your endpoints in the best way, weâve created the 2022 Patching & Endpoint Managem
Read BlogWhat is remote code execution? Remote code execution (or RCE), often also referred to as arbitrary code execution (or ACE), is a classification of vulnerabilities that allow an attacker to run any command or code on a target system or within a target process. RCE is a top exploitation technique
Read BlogWelcome to the sixth installment of our blog series that focused on the power of automated scripts: How We Worklet. Today, we have the great pleasure of talking shop with Automox Senior Security Engineer, Randall Pipkin. But before we dive in and discover what Randallâs Certificate Configurati
Read BlogFor teams navigating todayâs IT landscape and supporting user device issues, speed and execution of the best-suited resolution are the name of the game. Sometimes, however, these goals can seem at odds with each other. If youâre focused on turning over tickets lightning-fast, things can get overlook
Read BlogWelcome to the fifth installment of our blog series: How We Worklet. Today, we have the great pleasure of talking shop with Automox IT Cloud Engineer, Ryan Braunstein. But before we dive in and discover what Ryanâs Worklet is all about, letâs briefly revisit just what Worklets are and how you
Read BlogWindows Server Update Services (WSUS) is a widely used tool that helps administrators with centralized patch management. Distributed by Microsoft, WSUS was designed to alleviate the pain and difficulty of patching manually. For Windows environments, WSUS seemed like a simple solution to the patch
Read BlogAs networks evolve and department needs change, the PC and workstation market has splintered. While Windows operating systems once dominated, macOS devices have risen steadily. As of June 2022, Microsoft Windows has dominated as the most-used desktop OS worldwide. Microsoft's share of the pie is
Read BlogIt can be difficult to identify gaps in your managed device estate, let alone prioritize vulnerabilities for remediation once theyâve surfaced. Remediating threat exposures often requires coordination across different teams and can be a time-consuming, arduous process. On the second Tuesday of ev
Read BlogFrom separate reporting structures, misaligned objectives, and sometimes clashing responsibilities, collaboration across ITOps and SecOps has its challenges. Add to that the remote workforce onslaught and a lack of skilled workers, and you've got a recipe to increase the divide between these essenti
Read BlogBoulder, Colo., â August 31, 2022 â AutomoxÂź, the cloud-native IT operations provider, is the winner of three âBest ofâ awards from third-party review site, TrustRadius. Automox qualified for the awards in the Summer 2022 Unified Endpoint Management (UEM) software category. Automox was recognize
Read BlogThe City of Beaumontâs Information Technology division provides the cityâs operating departments with technical support and the software and hardware â from workstations, remote devices, and police car Mobile Digital Communicators (MDCs) â to efficiently deliver services to the public.
Read BlogThereâs no disputing the massive growth in cloud computing and portable devices in recent years. Clearly, industry has moved on in a great many ways from the days of desktop computers and hardwired, on-prem networks.
Read BlogWhen the economy is healthy and things are full steam ahead, itâs easy to fix problems and solve issues with, well, money. In flush times, itâs easier to ask for what you need. But, these are not those times. Today, it seems as though each morning brings more news of downturn. Inflation is ram
Read BlogThe healthcare and pharmaceutical industries are no strangers to cybersecurity threats. In the face of massive global incidents, such as WannaCry and Kaseya, as well as other dangerous, sophisticated attacks, solid security practices are being implemented more effectively. Moreover, executive boards
Read BlogESG Economic Validation Report By Aviv Kaufmann, Senior ESG Validation Analyst; and Luz Andrea Vasquez, Consulting Analyst; June 2022 As organizations look to modernize, their IT environments are more complex than ever before. The surface of IT operations has expanded to include the data center, e
Read BlogIn July of 2022 Microsoft released its new patching service: Windows Autopatch. The Windows Autopatch allows ring deployment-style, automated patch management for Windows 10 and Windows 11. The feature is available to customers with Windows Enterprise E3 and above. Itâs no secret that many organi
Read BlogIf youâve been following this blog series so far, youâre aware that weâve been reviewing Microsoftâs suite of endpoint management tools over the last several months. But to refresh your memory â or if this is your first time joining us â hereâs a quick peek at what weâve reviewed so far: What is
Read BlogRelease Overview Agent 1.0.39 is a minor release that addresses multiple issues.This release is for all supported Windows, Mac and Linux operating systems.
Read BlogIn many regards, 2022 has been wild so far. However, one pillar of stability seems to be how certain organizations have adopted a remote-work strategy. Initially, the move was a safety measure. But the verdict on remote working is in, and guess what⊠employees are embracing it. While the buzz abo
Read BlogItâs the most celebratory of all Fridays â the one, the only: SysAdmin Appreciation Day! At Automox, we love our SysAdmins so much that we held an internal competition to create memes for all the SysAdmins out there. Drumroll, please... Thanks, Katherine Simches!
Read BlogWhat is Microsoft Endpoint Manager (MEM)? Microsoft Endpoint Manager (MEM) is Microsoftâs Unified Endpoint Manager (UEM). Gartner defines UEMs as âany tool that provides both agent and agentless management of computers and mobile devices through a single console with a user-centric view.â UEMs s
Read BlogWhat is Intune? Intune is Microsoftâs cloud-based mobile device management (MDM) solution. It provides agentless management for devices and is hosted in Azure â which means it doesnât require on-prem infrastructure nor will it need VPNs to manage devices.
Read BlogWhat We Learned from WannaCry 5 years later Just over five years ago, on the morning of May 12, 2017, a ransomware attack infected over 230,000 computers in more than 150 different countries. Beyond crippling businesses, the virus spread worldwide â fast â freezing many thousands of public servi
Read BlogSystem administrators are usually responsible for the upkeep, configuration, and reliable operation of their companyâs IT environment and devices. This often includes uptime, performance, and security. Thatâs a lot of responsibility. As a system admin, youâre more keenly aware of the technologies
Read BlogWhat is API? The acronym API stands for Application Programming Interface. Simply put, API allows systems to communicate through the delivery of requests and return of output. Automox educator Amelia Vacante offers API insight At Automox University, our goal is to educate your customers quickly
Read BlogExposed vulnerabilities remain a thorn in the side of IT teams Tetra Defense released its Q1 2022 Incident Response Insights report on June 29, 2022, with findings that attributed 57% of incidents (that Tetra Defense responded to) to an exploitation of a known vulnerability on the victimâs network.
Read BlogThe 2022 State of IT Operations Survey Results Are In Two years ago, most of us got locked out of our offices due to a global health crisis we expected to last mere weeks. But even the darkest clouds have silver linings. Though several businesses initially faced a range of pandemic-specific challen
Read BlogWhat an incredibly rewarding week we shared at RSAC 2022. In a way, this yearâs RSAC felt like an industry kick-off event more than a traditional trade show. Seeing connections being made and networks extended was great! This year felt more aggressive than normal in terms of forming new partne
Read BlogIn todayâs threat landscape, speed is of the essence â especially when dealing with software vulnerabilities and the risk of a breach. This becomes vital when an organizationâs SecOps team discovers an exploited, critical vulnerability that their ITOps team must remediate ASAP.
Read BlogTwo years ago, most of us got locked out of our offices due to a global health crisis we expected to last mere weeks. But even the darkest clouds have silver linings. Though several businesses initially faced a range of pandemic-specific challenges, many have since transitioned into a world thatâs e
Read BlogGhidra is a powerful tool. Its impressive scripting API can enable researchers to discover potentially vulnerable code within an application theyâre testing without relying on long-running and power-intensive fuzzing techniques. In the application security world, continuous testing of your compan
Read BlogMicrosoftâs SCCM (System Center Configuration Manager, now known formally as Configuration Manager and existing as a branch of Microsoft Endpoint Manager) is a paid lifecycle management solution from Microsoft that keeps track of a networkâs inventory, assists in application installation, and deploy
Read BlogHow much did you spend on IT last year? And how much more do you plan on spending this year? Technology initiatives have become a top priority for many companies to better prepare for dynamic and complex hybrid workforces. Enhancing infrastructure helps prevent cybercrime and strengthens business
Read BlogWe are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Read BlogFrom separate reporting structures, misaligned objectives, and sometimes clashing responsibilities, collaboration across ITOps and SecOps has its challenges. Add to that the remote workforce onslaught and a lack of skilled workers, and you've got a recipe to increase the divide between these essenti
Read BlogToday, the Cybersecurity and Infrastructure Agency (CISA) published a joint advisory with the cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom detailing 2021âs top routinely exploited vulnerabilities.
Read BlogThis monthâs Patch Tuesday looks like a breeze at first glance, but donât let the numbers fool you! There are some critically important vulnerabilities to get fixed up right away.
Read BlogIf this wasnât the first thing every Automox MSP customer said to us, it was second or third. And they were right. Their Kaseya or ConnectWise or Intune or NinjaOne or [name your RMM] solution does patching and a whole lot of other things to boot. SoâŠ
Read BlogMany organizations are caught unaware of the actual cost of their software and solutions. Oftentimes, the sticker price of the software is the assumed cost, but low and behold you get home with your oil-leaking British software to find a host of hidden maintenance costs. Letâs look at Microsoft Syst
Read BlogGhidra is a powerful tool. Its impressive scripting API can enable researchers to discover potentially vulnerable code within an application theyâre testing without relying on long-running and power-intensive fuzzing techniques. In the application security world, continuous testing of your compan
Read BlogSpeak with anyone in the cybersecurity field, and theyâll tell you this year will see the highest number of attacks and cybercrime damages to date; speak with anyone next year, and theyâll likely say the same thing. 2022 has seen over 6,000 CVEs reported in its first three months alone, along wit
Read Blogthe cloud-native IT operations provider, today announced new partnerships with Rapid7 (NASDAQ: RPD), who is advancing security with visibility, analytics, and automation delivered through its Insight Platform, and ServiceNow, the leading digital workflow company. The addition of Rapid7 and ServiceNo
Read BlogNo doubt youâve heard it said that you either do something right or do it fast. Too often, the implication is negative: By increasing speed, you lose accuracy. But in the world of IT, this tradeoff is unacceptable. IT teams need to be fast and precise without affecting the user experience.
Read BlogDesign systems are a hot topic. And, lately, theyâve reached the attention of nearly everyone in tech. If the goal is to bring consistency across products, design systems are necessary within software development. But the capability of design systems goes far beyond ensuring product consistency.
Read BlogBy improving your organization's cyber resilience, you can continue to operate with minimal disruption â even after an attack. Make your plan to avoid disruptions and financial losses.
Read BlogOn Thursday, Apple patched another zero-day, it's third this year after patching CVE-2022-22587 (an arbitrary code execution with kernel privileges vulnerability) and CVE-2022-22594 (a vulnerability allowing users browsing activities to be tracked and identified in real-time) in January. The latest
Read BlogOn Sunday, Adobe released out-of-band updates to patch a critical vulnerability in Adobe Commerce and Magento Open Source. CVE-2022-24086 is an improper input validation flaw that allows an attacker to execute arbitrary code without credentials or administrative privileges.
Read BlogA new CVSS 9.9 critical vulnerability in the Samba platform allows remote code execution with root privileges. The vulnerability, CVE-2021-44142, is an out-of-bounds heap read/write vulnerability in the Virtual File System (VFS) module called âvfs_fruitâ. The vulnerability impacts all versions of Sa
Read BlogThe distributed workforce is here to stay. As the dust settles from the transformation of the modern workforce in recent years, no other group is more aware of the shift to remote work, or shares more responsibility for the productivity of this population, than ITOps.
Read BlogEach of these acronyms represents a compliance organization or government regulation that impacts the cybersecurity space in some way.
Read BlogAutomoxÂź, the cloud-native IT Operations platform provider, today announced new features to help enterprises and managed services providers (MSPs) manage their large-scale, distributed IT environments with radical efficiency.
Read BlogIf youâve visited the Community in the past couple of weeks, you may have seen the new platform, but weâd like to share a just a few of the highlights here.
Read BlogThese are the questions over which IT administrators lose sleep. And, unfortunately, events like Log4J only confirm what most of us already know: We have a massive visibility issue in the IT and security world.
Read BlogAs you hopefully know by now, Log4Shell is a zero-day unauthenticated Remote Code Execution (RCE) vulnerability in Log4j versions 2.0-beta9 up to 2.14.1 identified as CVE-2021-44228.
Read BlogFew people would argue they donât have access to enough data. Itâs easy to suffer from data overload, especially when trying to connect disparate data sources from multiple locations to make business relevance out of it all.
Read BlogA joint Cybersecurity Advisory (CSA) was issued by CISA, the FBI, and the NSA to warn organizations of threats posed by Russian state-sponsored cyber attack operations.
Read Blog