Five worthy reads: Embracing the era of everything-as-a-service (XaaS)

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into the increasing adoption of XaaS models across enterprises to achieve agility, pervasive automation, and digitization of

General 2 min read Read

Mitigating insider threats with user behavior analytics [Free webinar]

 

Keeping threats at bay and safeguarding the network is every IT administrator’s primary concern. However, it’s usually easier said than done. With traditional auditing solutions, numerous event logs are simply pulled up with little context and no correlation between …

General 1 min read Read

#MEtheNorth: Here’s how our User Conference can help you stay on top of your IT game

The Raptors winning the NBA title may not be the only big thing to hit Canada in 2019. In two weeks, we’ll kick off our first-ever User Conference in Canada on Tuesday, September 10, in Toronto. Instead of the usual …

General 3 min read Read

Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patched

No matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the Microsoft Security Response Center’s warning note, “August 2019 Security Update includes fixes for wormable RCE vulnerabilities in Remote Desktop Services (RDS), affecting all …

General 3 min read Read

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively.

Data sprawl—defined as the proliferation …

General 3 min read Read

Top three reasons passwords are here to stay as the primary form of authentication

Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in 2019 most of us are still logging on to various platforms using passwords. Passwords have been an essential part of authentication from …

General 2 min read Read

The why and how of browser security

The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that cybercriminals are exploiting to target organizations. Unfortunately for these organizations, restricting access to the internet …

General 3 min read Read

Five worthy reads: Should NoOps be your new operations strategy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps is just a buzzword, a far-fetched reality, or simply the next evolutionary state of DevOps.

General 3 min read Read

Boost your organization’s productivity with these 5 password management techniques

For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail, Outlook, and other …

General 2 min read Read