The Colonial Pipeline ransomware attack is potentially one of the worst cyberattacks to have happened this decade. A hacker group known as DarkSide stole nearly...
Network monitoring tools: The good, the bad, and the ugly
For organizations that rely on their network to support their daily operations, how well the network operates can make or break their business. As a...
Using ServiceDesk Plus? Make instant troubleshooting and seamless ITOM your superpowers [Webinar]
Running an IT desk is no easy task. This is the first place users turn to when they find any issues with their IT resources,...
Visit ManageEngine at GITEX Technology Week 2021 this month
ManageEngine will exhibit its suite of IT management solutions at GITEX Technology Week, Oct. 17-21, 2021, at the Dubai World Trade Center in UAE. Drop...
Five worthy reads: How well do you know your chatbot?
Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we take a...
Five worthy reads: Decentralized identity—bringing data back to its owners
Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore decentralized...
Five worthy reads: Data center operations through the eyes of AI
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about...
Beware of malware attacks: Little-known facts and why they matter
Did you know that nearly 560,000 new instances of malware are detected every day? As cybersecurity advances, threat actors develop malware with new tricks that...
Five worthy reads: Differential privacy—what it means for businesses
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one...