• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

OpManager | May 24, 2023

El Salvador's government health care institution delivers exceptional medical services leveraging OpManager

Instituto Salvadoreno del Seguro Social (ISSS), an El Salvador based government health care institution, provides medical services such as treatment,...

Centro de Operações de Segurança (SOC): como proteger sua empresa

General | May 24, 2023

Centro de Operações de Segurança (SOC): como proteger sua empresa

O mundo está adotando cada vez mais a tecnologia de nuvem. O fato dela exigir infraestrutura e custos...

Happy National DevOps Day! Discover your DevOps personality with our quiz

General | May 24, 2023

Happy National DevOps Day! Discover your DevOps personality with our quiz

It's every DevOps enthusiast's favorite day of the year again! National DevOps Day is celebrated every year...

User identity mapping for improved anomaly detection

Log360 | May 22, 2023

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always with the same...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Log360 | May 19, 2023

Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection

Threat detection and mitigation is one of the core responsibilities of a SOC. With...

Latitude data breach: How one click could cost you everything

IT Security | May 19, 2023

Latitude data breach: How one click could cost you everything

Imagine clicking on a seemingly harmless link and unknowingly giving away your personal...

Five worthy reads: The interfused future of AI in cryptocurrencies

General | May 19, 2023

Five worthy reads: The interfused future of AI in cryptocurrencies

Five worthy reads is a regular column on five noteworthy items we have discovered while...

Will predictive AI revolutionize the SIEM industry?

Security Information and Event Management | May 18, 2023

Will predictive AI revolutionize the SIEM industry?

The cybersecurity industry is extremely dynamic and always finds a way to accommodate the...

Top tips: How developers and ChatGPT can be best friends

General | May 18, 2023

Top tips: How developers and ChatGPT can be best friends

People have been using ChatGPT for various reasons over the past few months. Though the...

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Firewall Analyzer | May 17, 2023

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Squid proxies are among the most popular open-source proxy servers preferred by companies...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!