• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

General | July 12, 2022

ManageEngine captures the Cyber Defense Global InfoSec Awards 2022 spotlight with 5 top honors

At the RSA Conference in San Francisco on June 6, Cyber Defense Magazine celebrated the 10th Annual Cyber Defense Global InfoSec Awards. A prestigious...

The roadmap to Zero Trust starts with authentication [Webinar]

General | July 11, 2022

The roadmap to Zero Trust starts with authentication [Webinar]

With companies juggling remote and hybrid workforce models, security teams are facing a new challenge: to...

Five worthy reads: Take note—digital humans are catching up

General | July 8, 2022

Five worthy reads: Take note—digital humans are catching up

Five worthy reads is a regular column on five noteworthy items we've discovered while researching trending and...

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

RecoveryManager Plus | July 7, 2022

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

Microsoft SharePoint Online is one of the most widely used content management platforms. Unfortunately,...

Featured

AIOps whitepaper is now live

IT operations management and observability

[White paper] AIOps 2.0: The future of resilient IT operations is here

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

Kerberos and Active Directory

Identity and access management | July 6, 2022

Kerberos and Active Directory

If you have been researching Active Directory (AD), chances are that you will come across...

Security Information and Event Management | July 5, 2022

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data...

Clearing the air over the new CERT-In rules

IT Security | July 4, 2022

Clearing the air over the new CERT-In rules

Authorities that lay down compliance regulations often update them in order to keep them...

General | July 1, 2022

Are your credentials safe? Decoding credential phishing attacks 

Companies have increasingly allowed bring your own device (BYOD) policies to support...

What to look for in a Windows network monitoring tool

OpManager | June 30, 2022

What to look for in a Windows network monitoring tool

Monitoring the Windows devices in a network is difficult yet essential since the devices...

AD360 | June 29, 2022

How to lower security risks and cyber insurance premiums

The COVID-19 pandemic has transformed the way we live and work as we continue to rely more...

Discover more

Featured

AIOps whitepaper is now live

IT operations management and observability

[White paper] AIOps 2.0: The future of resilient IT operations is here

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management