The benefits of supercharging ITSM with automation

The benefits of supercharging ITSM with automation

IT Service Management (ITSM) has long been the backbone of operational efficiency in modern businesses. However, as IT demands grow and systems become increasingly complex, IT teams often face challenges when it comes to keeping up. To combat this, many IT leaders are using automation, making processes faster, smarter and much more impactful. ITSM automation can empower organizations to achieve superior efficiency, accuracy, and scalability while improving employee morale and productivity. For IT leaders looking…

Read More

PTC, 김도균 한국 지사 대표 겸 본사 부사장 선임

PTC, 김도균 한국 지사 대표 겸 본사 부사장 선임

클라우드, IT, 애플리케이션, 인터넷 서비스 분야에서 20년 이상의 경력을 보유한 김도균 대표는 PTC에 합류하기 전 클라우드플레어의 초대 한국지사 대표로서 조직을 설립하고 급속한 성장을 이끈 인물이다. 그 외에도 SAP, 델, 오토데스크, 아카마이, 데이터에이아이 등에서 프리세일즈, 컨설팅, 사업총괄 등 다양한 리더십 포지션을 역임했다. 로버트 다다 PTC 수석 부사장 겸 최고 매출 책임자는 “김도균 한국 지사 대표는 비즈니스 및 기술 분야에서 경험이 풍부한 리더로, 고객이 제품을 더 잘 개발할 수 있도록 지원하는 데 기여할 것으로 기대한다”라고 말했다. 김도균…

Read More

Vodafone Urges UK Cybersecurity Policy Reforms

Vodafone Urges UK Cybersecurity Policy Reforms

Vodafone Business has made various policy recommendations to the UK government, including enhancements to the Cyber Essentials scheme and tax incentives for cybersecurity, after revealing that inadequate cybersecurity measures cost UK SMEs £3.4bn ($4.4bn) annually. Vodafone found that the average cost of a cyber-attack for a small business is around £3398 ($4370), with this figure rising to £5001 ($6425) for companies with over 50 employees. These findings are part of Vodafone Business’ Securing Success: The…

Read More

Government Backs Britain’s First Cyber Seed Fund, Worth £50m

Government Backs Britain’s First Cyber Seed Fund, Worth £50m

The government-backed British Business Bank has committed nearly three-quarters of the £50m ($64m) fund which launched today to help early-stage UK cyber-startups. Venture capital firm Osney Capital’s Fund 1 plans to invest between £250,000 and £2.5m in 30 portfolio companies at pre-seed and seed stage, before stumping up for follow-on Series A rounds. The Cheltenham-based VC firm said the fund was oversubscribed, such is the excitement around the UK’s burgeoning cyber startup scene. The UK’s…

Read More

Aussie Savers Hit with Wave of Credential Stuffing Attacks

Aussie Savers Hit with Wave of Credential Stuffing Attacks

Australian superannuation fund providers were targeted en masse last weekend, with as many as 20,000 customer accounts reportedly hijacked in what appears to have been a credential stuffing raid. Industry body the Association of Superannuation Funds of Australia (ASFA) revealed in a statement on Friday that hackers had targeted “a number of funds” the weekend before. “While the majority of the attempts were repelled, unfortunately a number of members were affected. Funds are contacting all…

Read More

메타, 차세대 멀티모달 AI 모델 ‘라마 4’ 시리즈 공개

메타, 차세대 멀티모달 AI 모델 ‘라마 4’ 시리즈 공개

라마 4 매버릭은 170억 개의 활성 파라미터를 갖추었으나, 128개의 전문가로 구성되어 더 정교한 추론과 다양한 입력 방식에 대응할 수 있다. 메타는 이 모델이 GPT-4o 및 제미나이 2.0 플래시보다 높은 성능을 기록했다고 주장했다. 두 모델은 메타가 아직 외부에 공식 공개하지 않은 ‘라마 4 비히모스(Llama 4 Behemoth)’에서 지식을 증류(distillation)받아 개발되었다. 여기서 말하는 지식 증류란 대규모 고성능 모델이 학습한 결과를 기반으로, 더 작고 효율적인 모델을 학습시키는 기술이다. 복잡한 모델의 풍부한 지식에서 핵심만 추출해 작은 모델에 전달하는 방식이라는 점에서,…

Read More

Information Security Risk Management (ISRM) Boosts Compliance by Undermining Configuration Drift

Information Security Risk Management (ISRM) Boosts Compliance by Undermining Configuration Drift

Compliance is a “ticket to entry” for businesses today, and information security risk management (ISRM) makes sure organizations hang on to their ticket. In this blog, we’ll review how ISRM helps organizations not only get compliant but stay compliant. And how Tripwire makes that process automatic. Compliance is a Core Cost of Doing Business Today Without adhering to industry-standard data privacy and cybersecurity compliance principles, a modern enterprise can hardly exist. Research shows that the average organization is…

Read More

Mastering Cybersecurity Incident Communication Part 1: A Proactive Approach

Mastering Cybersecurity Incident Communication Part 1: A Proactive Approach

Cybersecurity threats are no longer a matter of “if” but “when.” While companies invest heavily in technical defenses, one important aspect often gets overlooked — communication. How an organization communicates during a cybersecurity incident determines the speed and effectiveness of its response, as well as the level of trust it maintains with stakeholders. Here, we’ll walk through the cybersecurity incident lifecycle, highlighting best practices for clear, timely, and strategic communication at each stage — from…

Read More

도장 찍은 이후가 중요··· IT 공급업체 ‘관계 관리’의 9가지 원칙

도장 찍은 이후가 중요··· IT 공급업체 ‘관계 관리’의 9가지 원칙

새로운 관계의 경우, 더 높은 수준에서 더 자주 소통해야 할 가능성이 높다. 소통 리듬을 설정함에 있어 이러한 체크인의 시기와 특성을 명확하게 설명해야 한다. 컨퍼런스 콜, 공식적인 검토, 팀 회의 등이 모두 소통 일정에 포함되어야 모든 사람이 제대로 진행되고 있는지 확인할 수 있다. 효과적인 소통은 생산성을 최대 25%까지 높일 수 있다. 5. 관계 관리 프로그램 개발 관계 관리 프로그램은 공급업체의 협력을 끌어내는 데 중요하다. 여기에는 합의된 KPI와 원하는 결과를 바탕으로 공급업체의 성과를 측정하는 프로그램, 파트너십 비용이…

Read More

From Chaos to Control: The Power of Immutable Backups in Disaster Scenarios

From Chaos to Control: The Power of Immutable Backups in Disaster Scenarios

Natural disasters, be it hurricanes, earthquakes, tornados, floods or wildfires, can cripple an organization’s infrastructure, rendering IT networks and the systems that secure them vulnerable while exposing sensitive data to potential breaches. However, by recognizing cybersecurity as a core pillar of disaster recovery planning, organizations can not only survive but emerge stronger after a crisis. For CEOs and C-suite executives, integrating cybersecurity into disaster recovery and business continuity planning is no longer optional. It is…

Read More
1 4 5 6 7 8 2,699