Discover how our solutions have empowered organizations to overcome challenges, achieve operational excellence, and drive transformative growth. Learn from real-world success stories.
Februaryâs Patch Tuesday is undoubtedly headlined by three zero-days and several important vulnerabilities in Microsoft Exchange Server that allow remote code execution for authenticated attackers. Nothing has been exploited yet, but itâs a fairly safe bet that will be.
Read Blog
IT organizations are prioritizing efficiency, security, and adaptability in a fast-paced industry, as usual. But staying competitive not only requires adopting emerging best practices but also moving away from outdated processes. In this blog, you'll get an outline of key IT practices shaping the fu
Read Blog
Automox, the cloud-native IT operations platform for modern organizations, today announced its authorization as a CVE (Common Vulnerabilities and Exposures) Numbering Authority (CNA).
Read Blog
August 2024âs Patch Tuesday has landed and this month we see 86 vulnerabilities and 6 Zero-Days. Among the big bundle of vulnerabilities, youâll find exploits like CVE 2024-38180, CVE 2024-38133, and CVE 2024-38199. The inclusion of these particular vulnerabilities underscores the need for immedi
Read Blog
AnyDesk Software GmbH recently announced their production systems were compromised and that they are revoking code signing certificates prior to AnyDesk Windows version 8.0.8. As a best practice, whenever a code signing certificate is compromised, any executable in your environment signed with that
Read Blog
As a SaaS provider, youâve got some pretty big shoes to fill. Youâve got to keep your customers happy and secure while keeping your costs down and staff productive. To help you with that, letâs start by naming three things that are extremely important for SaaS IT teams:
Read Blog
Whether youâre navigating a website, submitting an online form, or exploring an app that identifies your newest houseplant, the requirements to deem a tool user-friendly are often the same.
Read Blog
The automation landscape is all about reclaiming your time to focus on meaningful work.
Read Blog
Securing your endpoints is important in todayâs digital world. Automox worklets provide an ultimate shield against cyber threats, making it easy to protect your digital fortress.
Read Blog
With all the IT developments 2023 delivered, itâs clear thereâs no stopping change. It really is the only constant. But in IT, we thrive on change. Reflecting on the past year and its major changes, Automox experts are excited to see what the 2024 IT landscape has in store.
Read Blog
This Worklet removes Windows user profiles older than the provided age threshold
Read Blog
If youâre a sysadmin, it's probably no shocker to read about the pains of vulnerability detection and remediation.
Read Blog
Securing your endpoints isnât just a top priority for IT pros, but also for anyone who takes their online safety seriously.
Read Blog
Definition, Impact, and Best Practices for Patching
Read Blog
In the current digital landscape, organizations face the constant challenge of stabilizing security and accelerating the productivity of their IT systems. As such, timely patching is critical.
Read Blog
In the infosec world, abbreviations and acronyms abound. But what do they all mean? In this blog post, we'll go over the differences between some commonly confused acronyms â namely, CVE, CWE, CVSS, and CWSS.
Read Blog
In IT, both phrases ring true. These turns of phrase can conjure feelings of stress when you canât address your data or view all your endpoints from a single lens.
Read Blog
Our team has been hustling all month to crank out useful Worklets so you can automate any task, on any endpoint. Visit the Worklet Catalog to discover plug-and-play IT automations for hundreds of use cases across Windows, macOS, and Linux devices.
Read Blog
IT teams need to move faster and faster to keep up with new technologies, stay ahead of vulnerabilities, and drive productivity. Not only that, but having a team large enough to keep up with time consuming day-to-day tasks can be a challenge.
Read Blog
If youâre in the IT space, youâll hardly recollect December 2021 as the season for cheer, with the Apache Log4j vulnerability discovery causing shockwaves in the IT community. The finding is perhaps the most well-documented zero-day vulnerability in recent years, with a massive impact vector because
Read Blog
Vulnerability management refers to the process of discovering, identifying, cataloging, remediating, and mitigating vulnerabilities found in software or hardware. Patch management refers to the process of identifying, testing, deploying, and verifying patches for operating systems and applications f
Read Blog
Regular and consistent patching is critical to ensuring every endpoint is up-to-date and compliant with your corporate policies. Speed is also of the essence for patch management to ensure you can secure your endpoints faster than they can be exploited. Finding an efficient way to patch both servers
Read Blog
The Cyber Essentials and Cyber Essentials Plus certifications are helpful tools for bettering your organisationâs cybersecurity strategy and protecting your IT infrastructure against cyber threats. With automated endpoint management, Automox makes it easy to patch, configure, control, and secure you
Read Blog
Regular and consistent patching is critical to ensuring every endpoint is up-to-date and compliant with your corporate policies. Speed is also of the essence for patch management to ensure you can secure your endpoints faster than they can be exploited. Finding an efficient way to patch both servers
Read Blog
Weâve only cleared the first few months of the year, but IT teams are already feeling the heat. With nearly 100 vulnerabilities patched by Microsoft in January and companies worldwide preparing for budget reductions and workforce layoffs, 2023 looks like a tough year for IT admins and IT Operations
Read Blog
These are days of limited time and resources. Everything moves so fast and it can be hard for schools or local government organizations to stay on top of ever-changing financial and IT operational landscapes. The 2023 State of IT Operations Survey results indicate that IT operations teams in stat
Read Blog
Experts Weigh in on April 2023 Patch Tuesday Release
Read Blog
When youâre racing to block bad actors before they can exploit your vulnerabilities, youâve got to be able to put the proverbial pedal to the metal. When it comes to making sure endpoints are up to date and secure, your organizationâs patch efforts shouldnât be a âwhen we can get to itâ priority. Th
Read Blog
We have confirmation that malicious versions of both Windows and macOS of the 3CX Desktop App are being deployed via trojanized updates. However, the application is available for Linux and mobile systems as well. While the desktop applications for those platforms are not known to be compromised, we
Read Blog
Automation increases IT agility and allows you to simplify IT management in the modern workplace. Over half of IT professionals cite their top three reasons for increasing automation as improved security posture, more control across all endpoints, and reduced cost of IT operations.
Read Blog
If youâre in software development, you may know dynamic memory allocation and management can be a mixed bag. Although memory management within modern software has improved by leaps and bounds, the allocation and release of system memory resources can vary greatly.
Read Blog
Weâve only cleared the first few months of the year, but IT teams are already feeling the heat. With nearly 100 vulnerabilities patched by Microsoft this year alone, coupled with companies worldwide preparing for budget reductions and workforce layoffs, 2023 looks like a tough year for IT admins and
Read Blog
Security teams can feel overwhelmed and disillusioned as they grapple with masses of alerts amid increasing threats from sophisticated cyber attackers. In particular, enterprises that reacted fast in response to global lockdowns need automation to help bolster their security efforts. But there are w
Read Blog
Yet another development has sprung from the recent Lastpass breach saga, this time itâs encryption keys for customer vault backups that were stolen from a Senior DevOps employee, one of only four with
Read Blog
Following vulnerability and patch management, best practices should be a goal for organizations of every size. Vulnerability management refers to the process of discovering, identifying, cataloging, remediating, and mitigating vulnerabilities found in software or hardware, while patch management ref
Read Blog
The team here at Automox recently shared their predictions for the coming year in 9 IT Trends Set to Rock the Boat. Our thought leaders anticipated that organizations with cloud-based infrastructure would accomplish more with less than on-prem deployments. Where legacy on-prem solutions are fraught
Read Blog
If youâre anything like me, you know what needs to be done around the office, so to speak, but can barely find the time to make it all happen. So, we look for tools and resources that can help us get the job done, and even if the outcome isnât 100% what we envisioned, we still delivered! Iâd alwa
Read Blog
If youâve visited this blog before, you know how important patch management is to infrastructure upkeep and security. However, for many teams, developing an effective strategy to deal with outstanding patches can take a back seat to more strategic business matters. The thing is, patch management nee
Read Blog
Februaryâs Patch Tuesday is undoubtedly headlined by three zero-days and several important vulnerabilities in Microsoft Exchange Server that allow remote code execution for authenticated attackers. Nothing has been exploited yet, but itâs a fairly safe bet that will be.
Read Blog
Over the past several years, modern businesses have been migrating to cloud service providers to take advantage of lower costs, ease of use, and scalability. And according to recent analyst predictions, those trends arenât changing. To help your team adapt your patching strategy accordingly, weâve c
Read Blog
Alright, as we make it through the thick of the December holidays, itâs always good to take stock of what youâve learned, accomplished, and how you can improve your work in the coming days. When we look back on the year, one of the projects weâre most grateful for is our How We Worklet series. Th
Read Blog
Boulder, Colo., â December 21, 2022 â AutomoxÂź, the cloud-native IT operations provider, today announced a series of recognitions from respected third-party software marketplace, G2. Automox received six total awards as part of G2âs Winter 2023 recognition cycle.
Read Blog
IT teams can accelerate their businessâs growth by enabling staff to do more with fewer resources. And in today's digital world, organizations must strategize IT initiatives to stay relevant within a landscape of ever-evolving tech. That said, it can be a challenge for teams to reinforce the valu
Read Blog
The holidays can be a magical time. From Thanksgiving through December each year, there are more reasons to meet friends and family for cocktails or cozy nights in, share time-tested recipes, or tune into any great number of holiday flicks (Love, Actually, Die Hard, The Ref â choose your adventure).
Read Blog
Itâs been a long year, hasnât it? A long few years, in fact. But weâve learned a great deal from our most recent challenges. These days, weâre all experts when it comes to changing plans on a dime, adjusting expectations midflight, and recognizing the differences between distraction and more fruitfu
Read Blog
As your organization grows and becomes increasingly multi-faceted, managing the day-to-day operations of business, IT, and security manually can get more and more challenging. If you have limited resources, time, staff, or other limitations, automation and operational tooling help you get more do
Read Blog
Authentication and access controls play a crucial role in web application and system security. If these controls are weak or inconsistent, it can create a vulnerability threat actors can easily exploit via an authentication bypass. What is authentication bypass?
Read Blog
Weâre often asked when Automox is the better choice than WSUS. Of course, weâre biased, so we say âalwaysâ. But the reality is that some choose to run both WSUS and Automox together, to get the best of both worlds. Hereâs what that can look like.
Read Blog
Asking for funding during a financial upswing can be awkward and uncomfortable. Asking for budget in uncertain financial times? Buckle up, itâs going to be a bumpy ride! Use this go-to checklist to cover your bases so your request stands out and gets approved, even when dollars are scarce.
Read Blog
Automated Cross-OS Patching Say goodbye to manual patching. Automatically patch your Windows, macOs, and Linux devices with one easy to use platform.
Read Blog
100 cybersecurity startups with $100 million or more in VC funding over the past two years
Read Blog
Every single day, IT and helpdesk teams are bombarded with a multitude of tickets. Their goal is generally to keep end users happy and the businesses they work for productive. Typically, this requires a hybrid approach of automation and manual work. Some issues are frequent offenders that can be
Read Blog
Automation brings opportunities galore to IT teams everywhere. And these teams are quickly learning to use automated solutions to manage demand due to staff scarcity and diminishing budgetary resources. IT divisions are also discovering that automation assists with speeding up processes and incre
Read Blog
While many expect 2023 to be all about growth with much of the pandemic and remote workforce expansion behind us, current economic uncertainties, supply chain crises, and a shrinking pool of skilled resources have prioritized trends on which we werenât focused. We do ourselves a great favor to th
Read Blog
Youâve heard it before: Sometimes, you have to look back to move forward. From a cybersecurity perspective, this phrase goes a long way when studying Common Vulnerabilities and Exposures (CVEs). CVEs have been a pillar in our industry for decades, but how did we get here, what new trends are d
Read Blog
Tuesday, October 25, 2022, the OpenSSL project team announced that OpenSSL version 3.0.7 will be released on Tuesday, November 1. The release will include a fix for a critical, security-related vulnerability in OpenSSL versions 3.0 forward. This vulnerability may have existed since September of last
Read Blog
What is patch management? Patch management is the process in which security and/or IT teams identify and apply software or system patches to their organizationâs endpoints when new patches or updates become available. Patch management best practices refer to processes and tasks that align with a pr
Read Blog
On October 17, 2022, Researcher Alvaro Munoz discovered a vulnerability in the Apache Commons Text. The vulnerability, CVE-2022-42889, is a CVSSv3 9.8 and is present in Apache Common Text 1.5 through 1.9. Proof-of-Concept code walking through the vulnerability is already available.
Read Blog
Linux Kernel WLAN Remote Code Execution Vulnerabilities On October 13, security researcher Sönke Huster of TU-Darmstadt introduced a POC detailing several CVEs, including CVE-2022-42719 and CVE-2022-42720. Both are remote code execution (RCE) vulnerabilities in the Linux kernel WiFi stack present f
Read Blog
Itâs our favorite time of year again â the leaves are changing, the weather is cooling down, and itâs officially Cybersecurity Awareness Month! With a somewhat frightening economic climate, budget cuts, understaffing, and constant news about massive data breaches, the current landscape could be str
Read Blog
As we all start transitioning into post-COVID life, a lot of brainpower is going into figuring out where we should be doing our work. Do organizations stay the course of the past year and fully commit to distributed work (like we did at Automox)? Or request that employees return to the office once i
Read Blog
In the last year or so, it seems like the wave of companies transitioning their tools to the cloud has skyrocketed, doesnât it? 92% of enterprises have a multi-cloud strategy. That means that IT teams are left with a buffet of software in different clouds to deploy and maintain. The new world of
Read Blog
What does it take to keep your endpoints configured and secured? Sometimes, this question can seem elusive and you may not always know where to start. To help you get a hold of your security environment and to protect your endpoints in the best way, weâve created the 2022 Patching & Endpoint Managem
Read Blog
What is remote code execution? Remote code execution (or RCE), often also referred to as arbitrary code execution (or ACE), is a classification of vulnerabilities that allow an attacker to run any command or code on a target system or within a target process. RCE is a top exploitation technique
Read Blog
Welcome to the sixth installment of our blog series that focused on the power of automated scripts: How We Worklet. Today, we have the great pleasure of talking shop with Automox Senior Security Engineer, Randall Pipkin. But before we dive in and discover what Randallâs Certificate Configurati
Read Blog
For teams navigating todayâs IT landscape and supporting user device issues, speed and execution of the best-suited resolution are the name of the game. Sometimes, however, these goals can seem at odds with each other. If youâre focused on turning over tickets lightning-fast, things can get overlook
Read Blog
Welcome to the fifth installment of our blog series: How We Worklet. Today, we have the great pleasure of talking shop with Automox IT Cloud Engineer, Ryan Braunstein. But before we dive in and discover what Ryanâs Worklet is all about, letâs briefly revisit just what Worklets are and how you
Read Blog
Windows Server Update Services (WSUS) is a widely used tool that helps administrators with centralized patch management. Distributed by Microsoft, WSUS was designed to alleviate the pain and difficulty of patching manually. For Windows environments, WSUS seemed like a simple solution to the patch
Read Blog
As networks evolve and department needs change, the PC and workstation market has splintered. While Windows operating systems once dominated, macOS devices have risen steadily. As of June 2022, Microsoft Windows has dominated as the most-used desktop OS worldwide. Microsoft's share of the pie is
Read Blog
It can be difficult to identify gaps in your managed device estate, let alone prioritize vulnerabilities for remediation once theyâve surfaced. Remediating threat exposures often requires coordination across different teams and can be a time-consuming, arduous process. On the second Tuesday of ev
Read Blog
From separate reporting structures, misaligned objectives, and sometimes clashing responsibilities, collaboration across ITOps and SecOps has its challenges. Add to that the remote workforce onslaught and a lack of skilled workers, and you've got a recipe to increase the divide between these essenti
Read Blog
Boulder, Colo., â August 31, 2022 â AutomoxÂź, the cloud-native IT operations provider, is the winner of three âBest ofâ awards from third-party review site, TrustRadius. Automox qualified for the awards in the Summer 2022 Unified Endpoint Management (UEM) software category. Automox was recognize
Read Blog
The City of Beaumontâs Information Technology division provides the cityâs operating departments with technical support and the software and hardware â from workstations, remote devices, and police car Mobile Digital Communicators (MDCs) â to efficiently deliver services to the public.
Read Blog
Thereâs no disputing the massive growth in cloud computing and portable devices in recent years. Clearly, industry has moved on in a great many ways from the days of desktop computers and hardwired, on-prem networks.
Read Blog
When the economy is healthy and things are full steam ahead, itâs easy to fix problems and solve issues with, well, money. In flush times, itâs easier to ask for what you need. But, these are not those times. Today, it seems as though each morning brings more news of downturn. Inflation is ram
Read Blog
The healthcare and pharmaceutical industries are no strangers to cybersecurity threats. In the face of massive global incidents, such as WannaCry and Kaseya, as well as other dangerous, sophisticated attacks, solid security practices are being implemented more effectively. Moreover, executive boards
Read Blog
ESG Economic Validation Report By Aviv Kaufmann, Senior ESG Validation Analyst; and Luz Andrea Vasquez, Consulting Analyst; June 2022 As organizations look to modernize, their IT environments are more complex than ever before. The surface of IT operations has expanded to include the data center, e
Read Blog
In July of 2022 Microsoft released its new patching service: Windows Autopatch. The Windows Autopatch allows ring deployment-style, automated patch management for Windows 10 and Windows 11. The feature is available to customers with Windows Enterprise E3 and above. Itâs no secret that many organi
Read Blog
If youâve been following this blog series so far, youâre aware that weâve been reviewing Microsoftâs suite of endpoint management tools over the last several months. But to refresh your memory â or if this is your first time joining us â hereâs a quick peek at what weâve reviewed so far: What is
Read Blog
Release Overview Agent 1.0.39 is a minor release that addresses multiple issues.This release is for all supported Windows, Mac and Linux operating systems.
Read Blog
In many regards, 2022 has been wild so far. However, one pillar of stability seems to be how certain organizations have adopted a remote-work strategy. Initially, the move was a safety measure. But the verdict on remote working is in, and guess what⊠employees are embracing it. While the buzz abo
Read Blog
Itâs the most celebratory of all Fridays â the one, the only: SysAdmin Appreciation Day! At Automox, we love our SysAdmins so much that we held an internal competition to create memes for all the SysAdmins out there. Drumroll, please... Thanks, Katherine Simches!
Read Blog
What is Microsoft Endpoint Manager (MEM)? Microsoft Endpoint Manager (MEM) is Microsoftâs Unified Endpoint Manager (UEM). Gartner defines UEMs as âany tool that provides both agent and agentless management of computers and mobile devices through a single console with a user-centric view.â UEMs s
Read Blog
What is Intune? Intune is Microsoftâs cloud-based mobile device management (MDM) solution. It provides agentless management for devices and is hosted in Azure â which means it doesnât require on-prem infrastructure nor will it need VPNs to manage devices.
Read Blog
What We Learned from WannaCry 5 years later Just over five years ago, on the morning of May 12, 2017, a ransomware attack infected over 230,000 computers in more than 150 different countries. Beyond crippling businesses, the virus spread worldwide â fast â freezing many thousands of public servi
Read Blog
System administrators are usually responsible for the upkeep, configuration, and reliable operation of their companyâs IT environment and devices. This often includes uptime, performance, and security. Thatâs a lot of responsibility. As a system admin, youâre more keenly aware of the technologies
Read Blog
What is API? The acronym API stands for Application Programming Interface. Simply put, API allows systems to communicate through the delivery of requests and return of output. Automox educator Amelia Vacante offers API insight At Automox University, our goal is to educate your customers quickly
Read Blog
Exposed vulnerabilities remain a thorn in the side of IT teams Tetra Defense released its Q1 2022 Incident Response Insights report on June 29, 2022, with findings that attributed 57% of incidents (that Tetra Defense responded to) to an exploitation of a known vulnerability on the victimâs network.
Read Blog
The 2022 State of IT Operations Survey Results Are In Two years ago, most of us got locked out of our offices due to a global health crisis we expected to last mere weeks. But even the darkest clouds have silver linings. Though several businesses initially faced a range of pandemic-specific challen
Read Blog
What an incredibly rewarding week we shared at RSAC 2022. In a way, this yearâs RSAC felt like an industry kick-off event more than a traditional trade show. Seeing connections being made and networks extended was great! This year felt more aggressive than normal in terms of forming new partne
Read Blog
In todayâs threat landscape, speed is of the essence â especially when dealing with software vulnerabilities and the risk of a breach. This becomes vital when an organizationâs SecOps team discovers an exploited, critical vulnerability that their ITOps team must remediate ASAP.
Read Blog
Two years ago, most of us got locked out of our offices due to a global health crisis we expected to last mere weeks. But even the darkest clouds have silver linings. Though several businesses initially faced a range of pandemic-specific challenges, many have since transitioned into a world thatâs e
Read Blog
Ghidra is a powerful tool. Its impressive scripting API can enable researchers to discover potentially vulnerable code within an application theyâre testing without relying on long-running and power-intensive fuzzing techniques. In the application security world, continuous testing of your compan
Read Blog
Microsoftâs SCCM (System Center Configuration Manager, now known formally as Configuration Manager and existing as a branch of Microsoft Endpoint Manager) is a paid lifecycle management solution from Microsoft that keeps track of a networkâs inventory, assists in application installation, and deploy
Read Blog
How much did you spend on IT last year? And how much more do you plan on spending this year? Technology initiatives have become a top priority for many companies to better prepare for dynamic and complex hybrid workforces. Enhancing infrastructure helps prevent cybercrime and strengthens business
Read Blog
We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Read Blog
From separate reporting structures, misaligned objectives, and sometimes clashing responsibilities, collaboration across ITOps and SecOps has its challenges. Add to that the remote workforce onslaught and a lack of skilled workers, and you've got a recipe to increase the divide between these essenti
Read Blog
Today, the Cybersecurity and Infrastructure Agency (CISA) published a joint advisory with the cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom detailing 2021âs top routinely exploited vulnerabilities.
Read Blog
This monthâs Patch Tuesday looks like a breeze at first glance, but donât let the numbers fool you! There are some critically important vulnerabilities to get fixed up right away.
Read Blog
If this wasnât the first thing every Automox MSP customer said to us, it was second or third. And they were right. Their Kaseya or ConnectWise or Intune or NinjaOne or [name your RMM] solution does patching and a whole lot of other things to boot. SoâŠ
Read Blog
Many organizations are caught unaware of the actual cost of their software and solutions. Oftentimes, the sticker price of the software is the assumed cost, but low and behold you get home with your oil-leaking British software to find a host of hidden maintenance costs. Letâs look at Microsoft Syst
Read Blog
Ghidra is a powerful tool. Its impressive scripting API can enable researchers to discover potentially vulnerable code within an application theyâre testing without relying on long-running and power-intensive fuzzing techniques. In the application security world, continuous testing of your compan
Read Blog
Speak with anyone in the cybersecurity field, and theyâll tell you this year will see the highest number of attacks and cybercrime damages to date; speak with anyone next year, and theyâll likely say the same thing. 2022 has seen over 6,000 CVEs reported in its first three months alone, along wit
Read Blog
the cloud-native IT operations provider, today announced new partnerships with Rapid7 (NASDAQ: RPD), who is advancing security with visibility, analytics, and automation delivered through its Insight Platform, and ServiceNow, the leading digital workflow company. The addition of Rapid7 and ServiceNo
Read Blog
No doubt youâve heard it said that you either do something right or do it fast. Too often, the implication is negative: By increasing speed, you lose accuracy. But in the world of IT, this tradeoff is unacceptable. IT teams need to be fast and precise without affecting the user experience.
Read Blog
Design systems are a hot topic. And, lately, theyâve reached the attention of nearly everyone in tech. If the goal is to bring consistency across products, design systems are necessary within software development. But the capability of design systems goes far beyond ensuring product consistency.
Read Blog
By improving your organization's cyber resilience, you can continue to operate with minimal disruption â even after an attack. Make your plan to avoid disruptions and financial losses.
Read Blog
On Thursday, Apple patched another zero-day, it's third this year after patching CVE-2022-22587 (an arbitrary code execution with kernel privileges vulnerability) and CVE-2022-22594 (a vulnerability allowing users browsing activities to be tracked and identified in real-time) in January. The latest
Read Blog
On Sunday, Adobe released out-of-band updates to patch a critical vulnerability in Adobe Commerce and Magento Open Source. CVE-2022-24086 is an improper input validation flaw that allows an attacker to execute arbitrary code without credentials or administrative privileges.
Read Blog
A new CVSS 9.9 critical vulnerability in the Samba platform allows remote code execution with root privileges. The vulnerability, CVE-2021-44142, is an out-of-bounds heap read/write vulnerability in the Virtual File System (VFS) module called âvfs_fruitâ. The vulnerability impacts all versions of Sa
Read Blog
The distributed workforce is here to stay. As the dust settles from the transformation of the modern workforce in recent years, no other group is more aware of the shift to remote work, or shares more responsibility for the productivity of this population, than ITOps.
Read Blog
Each of these acronyms represents a compliance organization or government regulation that impacts the cybersecurity space in some way.
Read Blog
AutomoxÂź, the cloud-native IT Operations platform provider, today announced new features to help enterprises and managed services providers (MSPs) manage their large-scale, distributed IT environments with radical efficiency.
Read Blog
If youâve visited the Community in the past couple of weeks, you may have seen the new platform, but weâd like to share a just a few of the highlights here.
Read Blog
These are the questions over which IT administrators lose sleep. And, unfortunately, events like Log4J only confirm what most of us already know: We have a massive visibility issue in the IT and security world.
Read Blog
As you hopefully know by now, Log4Shell is a zero-day unauthenticated Remote Code Execution (RCE) vulnerability in Log4j versions 2.0-beta9 up to 2.14.1 identified as CVE-2021-44228.
Read Blog
Few people would argue they donât have access to enough data. Itâs easy to suffer from data overload, especially when trying to connect disparate data sources from multiple locations to make business relevance out of it all.
Read Blog
A joint Cybersecurity Advisory (CSA) was issued by CISA, the FBI, and the NSA to warn organizations of threats posed by Russian state-sponsored cyber attack operations.
Read Blog