Unified endpoint management and security | March 5, 2018uTorrent vulnerability: Another reason to blacklist unnecessary third-party softwareSecurity vulnerabilities have become headline news, and not just in the IT world. A crucial vulnerability in popular downloading software uTorrent is...
General | March 2, 2018Five worthy reads: Blockchain—How one phenomenal innovation is impacting the worldFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
IT Security | March 2, 2018Gold Lowell uses SamSam ransomware to terrorize SMBsFrom late December 2017 to mid January 2018, several small and medium businesses found themselves the victims...
Identity and access management | March 1, 2018Preventing active password attacks using ADManager Plus' Custom Reports In this blog, we'll discuss how Kerberos pre-authentication helps mitigate password attacks. We'll also...
Security Information and Event Management | February 28, 2018A reminder to focus on securing your databases and web servers The trend of global cyberattacks has continued into February. In California, The...
OS Deployer | February 20, 2018Ready, set, go: Deploy OS in Desktop CentralOS deployment is a crucial task for IT administrators, whether they're working on...
ServiceDesk Plus | February 19, 2018Enhanced change management in ServiceDesk Plus: 5 tips to simplify your change implementationsDo you manage your organization's IT infrastructure? Then you've probably dealt with...
IT Security | February 16, 2018How to prioritize your top security alerts for better SIEMReceiving alerts when a critical event occurs is the first step in responding to a...
General | February 16, 2018GDPR lessons from the Octoly data leakBack in 2017, Forever 21, Hyatt Hotels, Uber, and eBay all had their fair share of...
General | February 15, 2018Five worthy reads: Machine learning, the next phase of cybersecurityFive worthy reads is a regular column on five noteworthy items we’ve discovered while...