Security Information and Event Management | August 6, 2020Are you listening to your logs? Part 1: Slow server responseLoading… Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three...
General | August 5, 2020We studied how the pandemic has affected ITSM—here are the resultsAs the world moves towards the “new normal” on account of the pandemic, numerous adjustments and...
General | August 5, 2020Our SIEM Podcast series is now live! Tune in now.We are happy to announce the launch of our security information and event management (SIEM) podcast series...
Log360 | August 4, 2020Can a misconfigured user account lead to a security breach?Do you remember the last time you had to reset the password for an admin user? Or the time you last updated...
OpUtils | August 4, 2020Introducing the OpUtils mobile appTroubleshoot your IP addresses and switch ports faster and smarter! Managing and...
IT Security | July 30, 2020Unfolding the Twitter security incidentIn case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...
IT Security | July 29, 2020Breach notification requirements of POPIA: The importance of SIEMA crucial aspect of the Protection of Personal Information Act (POPIA) is the notification...
Applications Manager | July 24, 20206 Linux server performance metrics to look out forLinux is one of the best known and most used open source operating systems. The key...
General | July 24, 2020Five worthy reads: Remote workplaces: Is hybrid the way to go?Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | July 23, 2020The 5 essential components of successful file server auditingFile server auditing is an essential process, and inattention can cost your organization...