General | August 5, 2020We studied how the pandemic has affected ITSM—here are the resultsAs the world moves towards the “new normal” on account of the pandemic, numerous adjustments and recalibrations have been made in all aspects of our...
General | August 5, 2020Our SIEM Podcast series is now live! Tune in now.We are happy to announce the launch of our security information and event management (SIEM) podcast series...
Log360 | August 4, 2020Can a misconfigured user account lead to a security breach?Do you remember the last time you had to reset the password for an admin user? Or the time you last updated...
OpUtils | August 4, 2020Introducing the OpUtils mobile appTroubleshoot your IP addresses and switch ports faster and smarter! Managing and troubleshooting your network...
IT Security | July 30, 2020Unfolding the Twitter security incidentIn case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...
IT Security | July 29, 2020Breach notification requirements of POPIA: The importance of SIEMA crucial aspect of the Protection of Personal Information Act (POPIA) is the notification...
Applications Manager | July 24, 20206 Linux server performance metrics to look out forLinux is one of the best known and most used open source operating systems. The key...
General | July 24, 2020Five worthy reads: Remote workplaces: Is hybrid the way to go?Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | July 23, 2020The 5 essential components of successful file server auditingFile server auditing is an essential process, and inattention can cost your organization...
SharePointManager Plus | July 23, 20203 things every SharePoint administrator should monitor [E-book]Microsoft SharePoint is one of the most business-critical services in an enterprise's IT....