Jan 31, 2023 | IT Security
In November, 25 ITAM professionals gathered at our London office to share their experiences around a struggle faced by ITAM teams everywhere – how to create a productive and fruitful relationship with IT Security. Facilitated by David Foxen (SAM Beast...Jan 6, 2022 | IT Asset Management, IT Security
Data breaches are predicted to cost the global economy 10.5 trillion dollars by 2025. But the results are already in. Cybersecurity has never been higher on the agendas of companies and governments for whom a big breach could spell ultimate disaster. In recent years,...Oct 26, 2020 | IT Security
Protection against cyber security threats is becoming increasingly important. Organizations are being attacked every day and the consequences of a cyber security attack can be extremely costly (see our case studies below for examples). Practicing effective IT Asset...Oct 18, 2019 | IT Security, Software Asset Management
Year after year, Cyberattacks continue to pose a serious threat to millions of companies worldwide. But, year after year, companies continue throwing money at malware software and other solutions to patch the issue instead of finding a solution to shed light on their...Oct 16, 2019 | IT Security, Software Asset Management
In honor of National Cyber Security Awareness month, we want to talk about the relationship between Software Asset Management (SAM) and cyber security. More specifically, the role that SAM plays when it comes to shadow IT. Shadow IT Shadow IT is just one way to...May 1, 2019 | IT Security
On March 14th, 2017, Equifax discovered an exploit that allowed malicious code to execute within an XML request submitted in a user field, fully unrestricted. Soon after the exploit was discovered, Equifax added new preventative rules to their intrusion prevention...