• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

IT Security | April 13, 2020

Cybersecurity challenges of the work-from-home model

Just recently, the World Health Organization declared coronavirus a global pandemic. This decision brought with it several health and safety measures,...

General | April 10, 2020

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...

Monitoring critical business applications while working remotely

IT operations management and observability | April 10, 2020

Monitoring critical business applications while working remotely

With a huge number of employees around the globe working remotely during the COVID-19 pandemic, delivering...

How to effectively manage your AWS costs

Applications Manager | April 10, 2020

How to effectively manage your AWS costs

Often, when companies are new to Amazon Web Services (AWS), they aren't focused much on the cost. They're...

Featured

AIOps whitepaper is now live

IT operations management and observability

[White paper] AIOps 2.0: The future of resilient IT operations is here

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

Security Information and Event Management | April 9, 2020

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more...

Log360 | April 9, 2020

SQL Server, Part 1: Why you should monitor SQL logs

Over 44 records are stolen per second every day due to data breaches, and according to the...

Security tips for work-from-home organizations [Webinar]

General | April 9, 2020

Security tips for work-from-home organizations [Webinar]

Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote...

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

IT Security | April 8, 2020

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

The definition of an “attack” is changing. The level of complexity and technical expertise...

File shadowing: The key to a swift recovery from USB and file-based attacks

General | April 8, 2020

File shadowing: The key to a swift recovery from USB and file-based attacks

USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...

Ensuring your web applications offer an ideal user experience while working from home

IT operations management and observability | April 7, 2020

Ensuring your web applications offer an ideal user experience while working from home

While the recent pandemic has removed much of the traffic from the roads, it has led to an...

Discover more

Featured

AIOps whitepaper is now live

IT operations management and observability

[White paper] AIOps 2.0: The future of resilient IT operations is here

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management