• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

uTorrent vulnerability: Another reason to blacklist unnecessary third-party software

Unified endpoint management and security | March 5, 2018

uTorrent vulnerability: Another reason to blacklist unnecessary third-party software

Security vulnerabilities have become headline news, and not just in the IT world. A crucial vulnerability in popular downloading software uTorrent is...

Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world

General | March 2, 2018

Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...

Gold Lowell uses SamSam ransomware to terrorize SMBs

IT Security | March 2, 2018

Gold Lowell uses SamSam ransomware to terrorize SMBs

From late December 2017 to mid January 2018, several small and medium businesses found themselves the victims...

Preventing active password attacks using ADManager Plus

Identity and access management | March 1, 2018

Preventing active password attacks using ADManager Plus' Custom Reports

In this blog, we'll discuss how Kerberos pre-authentication helps mitigate password attacks. We'll also...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Security Information and Event Management | February 28, 2018

A reminder to focus on securing your databases and web servers 

The trend of global cyberattacks has continued into February. In California, The...

Ready, set, go: Deploy OS in Desktop Central

OS Deployer | February 20, 2018

Ready, set, go: Deploy OS in Desktop Central

OS deployment is a crucial task for IT administrators, whether they're working on...

Enhanced change management in ServiceDesk Plus: 5 tips to simplify your change implementations

ServiceDesk Plus | February 19, 2018

Enhanced change management in ServiceDesk Plus: 5 tips to simplify your change implementations

Do you manage your organization's IT infrastructure? Then you've probably dealt with...

IT Security | February 16, 2018

How to prioritize your top security alerts for better SIEM

Receiving alerts when a critical event occurs is the first step in responding to a...

General | February 16, 2018

GDPR lessons from the Octoly data leak

Back in 2017, Forever 21, Hyatt Hotels, Uber, and eBay all had their fair share of...

Five worthy reads: Machine learning, the next phase of cybersecurity

General | February 15, 2018

Five worthy reads: Machine learning, the next phase of cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!