Security Information and Event Management | March 17, 2023Inside the mind of a hacker: Alternate identities and varied behavioral patternsThe boom of information technology opened an entirely new world of identities and opportunities. Most users' journies in the cyber world started with...
General | March 17, 2023¿Qué es un administrador de dispositivos iOS?Muchas organizaciones necesitan de un administrador de dispositivos iOS. ¿Es posible gestionarlos? ¿Qué se...
Network Configuration Manager | March 15, 2023The importance of baseline configuration management in a networkIn a network environment, configurations are often considered of incalculable value because a small change in...
Log360 | March 15, 2023Segurança da nuvem: nosso prognóstico para 2023A tecnologia de nuvem está sendo cada vez mais usada devido à sua escalabilidade e eficiência, tornando-a uma...
Patch Manager Plus | March 15, 2023March 2023 Patch Tuesday comes with fixes for 83 vulnerabilities, including 2 zero daysThe third Patch Tuesday of the season doesn't fail to surprise us at all. Keeping the...
NetFlow Analyzer | March 14, 2023Network traffic analysis: A brief report on significant network performance monitoring avenueMost corporate IT landscapes have a variety of traffic types involved, like cloud, web,...
General | March 14, 2023¿Por qué y cómo sucede el robo de información?¿Te has preguntado cuales son los factores débiles que puede llegar a tener tu empresa y...
General | March 14, 2023Massive data breach with fake ChatGPT extension Chat Generative Pre-trained Transformer (ChatGPT) is now available on the official...
Applications Manager | March 13, 2023Oracle Database monitoring: An administrator's guideOracle Database is known for its reliability, scalability, and outstanding performance. An...
General | March 11, 2023Five worthy reads: Hello from the dark side—the nefarious nature of voice AI technologyFive worthy reads is a regular column on five noteworthy items we’ve discovered while...