• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Author:Jayashree S

  • Jayashree S
    Jayashree S
    Five worthy reads: How non-human identities are shaping the cybersecurity landscape

    General | November 8, 2024

    Five worthy reads: How non-human identities are shaping the cybersecurity landscape

    Five worthy reads is a regular column on five noteworthy items we have discovered while...

    Five worthy reads: How IAM is the cornerstone of securing identities across business verticals

    General | July 5, 2024

    Five worthy reads: How IAM is the cornerstone of securing identities across business verticals

    Five worthy reads is a regular column on five noteworthy items we have discovered while...

    RaaS attacks are on the rise: Top 5 tips to protect your organization

    General | April 2, 2024

    RaaS attacks are on the rise: Top 5 tips to protect your organization

    Over the years, we have seen a substantial amount of cyberattacks happening around the...

    Five worthy reads: Understanding low-code/no-code AI: App development simplified

    General | February 2, 2024

    Five worthy reads: Understanding low-code/no-code AI: App development simplified

    Five worthy reads is a regular column on five noteworthy items we’ve discovered while...