• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:General

Five worthy reads: Unified endpoint management, a 360° look at organizational security

General | March 30, 2018

Five worthy reads: Unified endpoint management, a 360° look at organizational security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

General | March 28, 2018

The GDPR: Correcting data security negligence from companies like Facebook, Swisscom and L'express

Incident 1: Facebook, Cambridge Analytica data leak  According to The New York Times,...

Password synchronization between Active Directory and Salesforce accounts

General | March 19, 2018

Password synchronization between Active Directory and Salesforce accounts

As the number of Salesforce user accounts increases within your organization, managing...

Five worthy reads: Kickstart your GDPR journey

General | March 16, 2018

Five worthy reads: Kickstart your GDPR journey

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Why automation is the best thing for compliance reporting

General | March 15, 2018

Why automation is the best thing for compliance reporting

The main purpose of compliance auditing is to identify how well a company is following...

General | March 6, 2018

University of Northern Colorado's response to cybersecurity breach exemplifies GDPR compliance

Another day, another cybersecurity breach. The University of Northern Colorado (UNC) has...

Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world

General | March 2, 2018

Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

General | February 16, 2018

GDPR lessons from the Octoly data leak

Back in 2017, Forever 21, Hyatt Hotels, Uber, and eBay all had their fair share of...

Five worthy reads: Machine learning, the next phase of cybersecurity

General | February 15, 2018

Five worthy reads: Machine learning, the next phase of cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

General | February 5, 2018

Free webinar: Everything you need to know about ransomware 

2017 saw plenty of ransomware attacks, and cyber security experts believe we'll see many...

Five worthy reads: Spectre, Meltdown, and chips that ooze data

General | February 2, 2018

Five worthy reads: Spectre, Meltdown, and chips that ooze data

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

General | February 1, 2018

ManageEngine patches zero-day vulnerabilities

Recently, several zero-day vulnerabilities in ManageEngine products were discovered by...

Page 58 of 82« First«...5657585960...»Last »