The ITAM Review

News, reviews and resources for worldwide ITAM, SAM and Licensing professionals.

Category: Security

Articles

  • Beyond the Patch: ITAM + Security

    In December 2021, we covered the Log4Shell/Log4J security vulnerability which was described as “the single biggest, most critical vulnerability of the last decade” – and how ITAM plays a role in helping organisations prevent and remediate cyber security threats. In this article,...

  • ITAM & the Log4J vulnerability

    Log4Shell – aka Log4J – is the latest software vulnerability to be discovered and, according to the Guardian, it could be the worst one to appear for several years. The CEO of Tenable called it “the single biggest, most critical vulnerability of the last decade” while...

  • Mitigate risk and vulnerabilities in your organization

    This article was written by Rich Gibbons, ITAM Review and Kevin Miller, Flexera. Image by Pete Linforth from Pixabay Chaos in the IT environment Digital disruption is making it difficult to control IT spend for a number of reasons, including: IT no longer owns or may have limited...

  • How could ITAM help Travelex restore service?

    As I write this in early February, foreign currency exchange provider Travelex has been down for over a month following a cyber-attack on December 31st, 2019. What we know so far is that they’ve followed police guidance and not paid the ransom demanded by the hackers and that they’re...

  • UK businesses turn to ISO 27001 to “Improve Infosec Posture”

    This article has been contributed by Matt Stacey at QMS International.  Recent Survey Highlights Shift in Business Cyber-Security Efforts The figures of the global survey of ISO management standards showed that over 2,000 Information Security Management System Certificates were...

  • Market Guide – Cloud Access Security Brokers (CASB)

    This month’s Market Guide looks at Cloud Access Security Brokers (CASB). These tools, usually maintained by network or security teams, are a key component in governing cloud deployments, particularly SaaS. Their purpose is to discover, monitor, control, and secure access between...

  • Engaging IT Security Operations in your ITAM Programme

    This article is the third of a four part series by AJ Witt of ITAM Review written in collaboration with ServiceNow’s Ryan Wood-Taylor & Peter Beruk. The series outlines how a strategic ITAM practice will deliver enhanced business value through creation of strategic stakeholder...

  • Sophos Cloud Optix – you can’t secure what you can’t see

    Sophos, the British FTSE 250 security company, have launched a dedicated public cloud security product – Cloud Optix. Cloud Security As many benefits as the public cloud can provide, it can also offer an equal – perhaps greater – number of potential security threats. Managing...

Stay Ahead of the Market

Receive free monthly updates about the SAM, ITAM, and Software Licensing market, upcoming events & link to resources you won't find anywhere else!