The Cybersecurity Risks caused by Human Error and How to Avoid Them

Through its research on the Psychology of Human Error, Stamford Univer...

Tech Debt and the Escalating Knowledge Crisis

In a 2021 survey of 700 IT decision-makers, 78% of respondents said th...

Key Takeaways from ITAM & FinOps: How to Win Big

At the recent ITAM Review conference ITAM & FinOps: How to Win Big...

2023 CIO Priorities: Overcoming Challenges and Making Progress

Earlier this year we noted the challenges ahead for CIOs as they align...

Tech Stack Out of Control? It’s Time for a New Approach.

Even as inflation remains high, CIOs are twice as likely to invest in ...

Five Steps to Sustainable IT Asset Disposition (ITAD)

Responsible IT asset disposition (ITAD) goes way beyond enterprise dat...

Redefining ITALM to Reduce Cyber Security Risks

As the number of connected enterprise devices and applications grow, s...

Augmenting ITAM with Asset Tracking to Mitigate Hardware and Data Loss

Tracking hardware assets across their lifecycle has always been challe...

Shadow IT: Turning Risk into Opportunities

Shadow IT – the unauthorized acquisition and use of hardware and softw...

Automating User Offboarding to Reduce Security Risks and Costs

In today’s volatile economic environment, as costs increase and budget...