Skip to content
ITAM Review
  • Home
  • About the ITAM Review
  • Contact
  • Subscribe

Security

A viewfinder looking into the clouds

Best PracticeSecurity

Sophos Cloud Optix – you can’t secure what you can’t see

Sophos, the British FTSE 250 security company, have launched a dedicated public cloud security product – Cloud Optix. Cloud Security As many benefits as the ... Read more

Written by: Rich Gibbons

Published on: May 9, 2019

Best PracticeSecurity

Internet of Things devices: The number one attack target on the internet

F5 Networks, the long-standing networking and application services vendor, recently released the latest in a series of reports tracking the Internet of Things (IoT) security ... Read more

Written by: Rich Gibbons

Published on: December 17, 2018

Best PracticeSecurity

Crypto-currency malware running in your cloud environment

Management and governance of cloud assets is a big, and growing, area for ITAM professionals to tackle. As more assets sit in the cloud, they ... Read more

Written by: Rich Gibbons

Published on: December 5, 2018

Best PracticeSecurity

Processor flaws cause Cyber Security panic, What can ITAM do to help?

Spectre and Meltdown, two major CPU based vulnerabilities recently discovered by Google’s “Project Zero” team, have caused quite the stir over the first couple of ... Read more

Written by: Rich Gibbons

Published on: January 30, 2018

IT Security

SecurityBest Practice

NotPetya, Wannacry and GDPR: How ITAM can support IT Security teams

New Cyber Security threats and European legislation are a great way for ITAM to revisit links with the security team and strengthen the importance of ... Read more

Written by: Martin Thompson

Published on: August 11, 2017

Best PracticeSecurity

Internet connected cameras used in cyber attack – are IoT assets on your radar yet?

The BBC reports that hackers used Internet connected devices last week to perform a denial of service attack that brought down Internet brands Twitter, Spotify ... Read more

Written by: Martin Thompson

Published on: October 26, 2016

Best PracticeSecurity

It is time to Talk (Talk) Security

It seems with each passing day; we see another story of a cyber security breach. After doing some research, I found that each day, we, ... Read more

Written by: Guest Contributor

Published on: November 17, 2015

Best PracticeSecurity

TalkTalk shares down 9% after cyber attack – could ITAM help with Cyber Security?

Dido Harding, the CEO of publicly listed Telco TalkTalk, faces the grim prospect of her company’s reputation and share price taking a nosedive today. The ... Read more

Written by: Martin Thompson

Published on: October 23, 2015

SecurityBest Practice

BYOD mobile data security policy? Not just now thanks

Absolute Software Corporation has announced what it labels as “independent research” suggesting that as much as a third of UK businesses have no formal or ... Read more

Written by: Adrian Bridgwater

Published on: December 4, 2012

Prev

About

Enterprise Opinions Limited
Fairview House
43 Bath Road
Old Town
Swindon
SN1 4AS

Recent Posts

  • Flying Blind on Mobile, Losing the SaaS War, Questioning the CMDB and Why FinOps Belongs in Your Tool Belt
  • The ROI of ITAM, SAM and Software Licensing Training: How to Build a Business Case That Actually Gets Approved
  • Vendor Lock-In: A Beginners Guide
  • 8 Dimensions of Trustworthy ITAM Data
  • FinOps prices the rooms, ITAM manages the hotel

Looking for something

x

Privacy Policy | Contact

Copyright ITAM Review © 2026
  • Home
  • About the ITAM Review
  • Contact
  • Subscribe