Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Service Management, Service Desk and related technologies.

What does risk appetite mean?

Defining your risk appetite – the level of risk your organization is willing to accept – is one of the most important steps to adopting an exposure management strategy. If your risk posture’s out of line with your risk appetite, it’s time to take action. Ivanti’s Chris Goettl breaks down defining your risk appetite and how it helps you make informed decisions about remediating vulnerabilities.

Preview Panel: Bottom or Side? #workspace #ultrawidemonitor

Maximize your workspace! Place the preview panel below your data views or on the right to make the most of your screen real estate, keeping your workflow smooth. Perfect for Service Desk agents and IT pros who want quick access to key information without extra scrolling, no matter the monitor size. Preview layouts and other powerful features are coming in the Fall 2025 release of Alloy Navigator.

Apple's Latest Software Updates and Security Highlights #shorts

Apple's Latest Software Updates and Security Highlights Apple announces updates for major operating systems, introducing a new naming convention with Mac OS 26. A significant CVE 43 300 is noted. Updates for third-party applications such as Chrome, Docker, Firefox, and Edge focus on addressing vulnerabilities. Thunderbird also receives an update to version 1.42. The month features a couple of zero days alongside regular updates for third-party applications.

Is Your Patch Process Hurting End Users' Experience? Here's How to Fix It

Just one bad patch can cause key systems to fail, disrupting your teams and, ultimately, your customer experience. While I was checking out at a supermarket self-service machine, the screen suddenly froze and then dreaded blue screen of death appeared. A nearby staff member quickly came over and, with a bit of a sigh, said it was the third time that day this happened. While I’ll never know for certain whether a patch was the only cause, businesses want to minimize these types of issues.

Understanding Linux Vulnerabilities and Their Impact

Understanding Linux Vulnerabilities and Their Impact Linux vulnerabilities pose significant risks, particularly CVE 20258067, which has active exploits in rebased distributions. CVE 202332256 enables remote attackers to access sensitive information without authentication. Additionally, CVE 202558367 presents a denial of service and remote code execution risk in the Delta class. Applications handling untrusted user input to Delta need careful scrutiny, and it is crucial to keep systems updated to mitigate these threats.

How Much Does Inventory Management Software Cost? (Complete Guide 2025)

In 2025, choosing the right inventory management system is one of the most important decisions for businesses of all sizes. These tools go far beyond simple inventory tracking: they improve workflows, prevent stockouts, and help companies streamline their supply chain. With features like barcode scanning, automation, and real-time inventory visibility, the right software can significantly optimize stock levels and increase overall profitability.

From Shadow AI to Strategy: The Six-Month AI Imperative (w/ Charlene Li)

In this very special episode of The DEX Show, we welcome back one of the world’s most influential voices on digital transformation and the future of AI leadership: Charlene Li. Charlene is a bestselling author and trailblazing thinker who has helped leaders navigate disruption for over two decades. She returns to the show for an unmissable conversation on the realities of AI Transformation—and what it means for organizations, leaders, and employees at every level.

How Nexthink Enables Smarter, Data-Driven Hardware Refresh Strategies

Bob did—until he realized there was a smarter way. With real-time insights from Nexthink, he stopped guessing and started making data-driven decisions: keeping the high performers, replacing the real troublemakers, and upgrading the underperformers. The result? Happier employees, optimized budgets, and devices refreshed based on need—not age.