• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Data at the edge: Meet modern data processing demands with edge computing

General | August 29, 2023

Data at the edge: Meet modern data processing demands with edge computing

We've all experienced latency in some form. It's unfortunately something we're all too familiar with. We've even gone so far as to accept it as a...

The MOVEit Transfer vulnerability affects 40 million people worldwide

General | August 25, 2023

The MOVEit Transfer vulnerability affects 40 million people worldwide

In over 600 data breaches, 40 million individuals were affected across the globe due to the MOVEit Transfer...

Five worthy reads: What

General | August 25, 2023

Five worthy reads: What's cooking between cookie consent and user privacy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...

Top tips: 3 ways emerging technologies can transform banking

General | August 24, 2023

Top tips: 3 ways emerging technologies can transform banking

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to...

Featured

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Patch Manager Plus

February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days

Endpoint Central

Guarding open-source AI: Key takeaways from DeepSeek’s security breach

OpManager | August 23, 2023

[White paper] Network Configuration Manager as an add-on to OpManager

In today's intricate landscape of sprawling enterprise networks, the need for robust...

Adopting the 5S strategy in cybersecurity

IT Security | August 21, 2023

Adopting the 5S strategy in cybersecurity

The 5S strategy has long been considered a reliable approach to workplace organization....

Beyond illusion: The transformative role of AI in mixed reality

General | August 18, 2023

Beyond illusion: The transformative role of AI in mixed reality

In the constantly changing world of technology, the convergence of artificial...

Top tips: 5 use cases for digital twins in the manufacturing sector

General | August 17, 2023

Top tips: 5 use cases for digital twins in the manufacturing sector

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

OpManager | August 16, 2023

IBM performance monitoring with OpManager: How governance eliminates outages

Performance monitoring is an essential practice in network monitoring. When something goes...

IT budgeting amid a challenging macroeconomic climate

General | August 15, 2023

IT budgeting amid a challenging macroeconomic climate

When economic uncertainty strikes, the first thing many organizations do is review their...

Discover more

Featured

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Patch Manager Plus

February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days

Endpoint Central

Guarding open-source AI: Key takeaways from DeepSeek’s security breach