General | April 13, 2018Five worthy reads: Revolutionizing IT with artificial intelligence Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | April 12, 2018Third biggest data breach in history emphasizes the need for the GDPR The top two data breaches in history, when you look at the number of affected users, comes...
General | April 12, 2018Microsoft Patch Tuesday April 2018 updates For this month's Patch Tuesday, Microsoft fixed 66 security issues. Luckily, in this...
General | April 11, 2018Lessons from data breaches that every enterprise should take to heart "Four years later, Yahoo still doesn't know how 3 billion accounts were hacked" read...
General | April 6, 2018Learn how to protect your environment from ransomware [Free webinar] Back by popular demand, the Everything you need to know about ransomware webinar will be...
General | April 5, 2018ManageEngine wins Network Management & Monitoring Vendor of the Year at the NWME Awards 2018 The results of the ninth annual Tahawul Tech's Network World Middle East Awards have...
General | March 30, 2018Five worthy reads: Unified endpoint management, a 360° look at organizational security Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | March 28, 2018The GDPR: Correcting data security negligence from companies like Facebook, Swisscom and L'express Incident 1: Facebook, Cambridge Analytica data leak According to The New York Times,...
General | March 19, 2018Password synchronization between Active Directory and Salesforce accounts As the number of Salesforce user accounts increases within your organization, managing...
General | March 16, 2018Five worthy reads: Kickstart your GDPR journey Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
General | March 6, 2018University of Northern Colorado's response to cybersecurity breach exemplifies GDPR compliance Another day, another cybersecurity breach. The University of Northern Colorado (UNC) has...