• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

AD360 | April 16, 2021

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a...

Five worthy reads: Location intelligence—the key to next-level data utilization

General | April 16, 2021

Five worthy reads: Location intelligence—the key to next-level data utilization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...

Patch Manager Plus | April 14, 2021

Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days

Yet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the...

ADSelfService Plus | April 6, 2021

The road ahead: McKinsey's top 5 cybersecurity predictions for 2021 and beyond

What is a bigger threat to mankind: nuclear weapons or cybercrime? While most would say nuclear weapons,...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

General | April 1, 2021

Is the cloud coming to all of us?

During the past twenty years, so much has changed in the IT office. Two decades ago, we...

Five worthy reads: The unexpected costs following a cyberattack

General | March 31, 2021

Five worthy reads: The unexpected costs following a cyberattack

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Azure security 101: Security essentials, logs, authentication, and more

Log360 | March 30, 2021

Azure security 101: Security essentials, logs, authentication, and more

“Where necessity speaks, it demands”. This old saying seems particularly apt right now...

Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]

ADAudit Plus | March 24, 2021

Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]

User logon activity needs to be audited to meet various security, operational, and...

Unraveling open port threats and enhancing security with port scanning tools

OpUtils | March 23, 2021

Unraveling open port threats and enhancing security with port scanning tools

From exposing your network vulnerabilities to becoming a passageway for intruders, open...

Five worthy reads: Understanding quantum computing and its impact on cybersecurity

General | March 12, 2021

Five worthy reads: Understanding quantum computing and its impact on cybersecurity

Five worthy reads is a regular column on five noteworthy items we discovered while...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!