The ITAM Roundup: 11/6/23
Early first impressions of M365 Copilot:
M365 Copilot is out, and Steve Goodman from Practical365 got to see in action in London at Microsoft Envision. An example for meetings:
What Copilot offers appears to be in-context meeting summarisation; if for example, you are late to a meeting; or you are pulled out of a meeting in progress for five minutes, then you can ask what happened while you were away. Or, if you missed the meeting you can dig into the details; and post-meeting is where the crossover begins.
Palo Alto Networks double dips in $1B of acquisitions:
Last week – Dig Security for ~$400M. This week, Talon Cyber Security for $625M.
Being Proactive with an IT Risk Assessment:
The sheer volume of bug and exploit news lately emphasizes the critical role of IT asset management (ITAM) in cybersecurity, particularly for managing cloud services and compliance with financial regulations. Non-compliance with such regulations can result in severe penalties, in both a financial and operational sense. Snow's article gives guidance on how to get started getting a lay of the land.
Make ITSM more dynamic by integrating with GitHub:
Ivanti discusses the advantages of integrating IT Service Management with GitHub to streamline and accelerate deployment processes. The integration enables automatic creation of change records when a developer commits code, and it can link change requests to specific commits for better traceability. This connectivity also facilitates compliance with various standards by maintaining a clear audit trail of changes.
It's time to think about AI governance:
The proliferation of advanced AI in business necessitates comprehensive AI governance, which is segmented into organizational, use case, and model levels, as explained by Andrew Gamino-Cheong of Trustible. Organizational governance sets the ethical framework and prepares for AI regulation compliance, while use case governance ensures AI applications are assessed for risk and comply with legal standards. Model governance focuses on the technical evaluation of AI systems, ensuring they are fair, accurate, and secure. As AI becomes integral to business, these governance layers are critical for managing risks and maintaining ethical standards in AI deployment.
Okta hit by another data breach:
Okta just can't catch a break lately. This latest issue stems from a 3rd party vendor (Rightway Healthcare). While this is not Okta the application itself being compromised, it does raise questions about future attacks, as this exploit resulted in personal information about Okta employees being obtained. This would lend itself to social engineering attacks down the line.
Don't wait to patch Citrix...
The exploit I referred to in the update on 10/22 is not going away. Ransomware hackers are actively exploiting this critical vulnerability in Citrix hardware, which allows them to circumvent multi-factor authentication and access enterprise networks. This vulnerability, known as Citrix Bleed and rated 9.4 in severity, exposes session tokens that are assigned to authenticated devices. Citrix released a patch for the flaw (CVE-2023-4966) three weeks ago, but the exploitation has intensified recently.