Microsoft DCOM hardening and its impact on Applications Manager

Microsoft recently acknowledged a critical vulnerability in the WMI connection affecting the DCOM protocol, which allowed attackers to bypass DCOM server security, elevate their privileges,...

Applications Manager , General 3 min read Read

World Password Day: Tips, quiz, and tools to improve password security

Password security, though sometimes underrated, is crucial for an organization to remain viable in the vast digital landscape. A popular quote on the internet says,...

ADSelfService Plus , General 2 min read Read

The state of ITOM in 2023: Strategic insights into observability, AIOps, cloud migration, and more

As the IT operations environment grows increasingly intricate, businesses are starting to recognize the significance of a flawless customer experience. Customer expectations are getting higher...

General 2 min read Read

How can citizen development help enterprises accelerate digital transformation?

In today’s world, digital transformation has become crucial for all types and sizes of organizations. It is no longer just a buzzword but a necessary...

General 5 min read Read

Why are passwords so difficult to remember?

We all have a lot of passwords to keep track of on a daily basis, whether they’re for shopping websites, emails, social media, or the...

General 5 min read Read

Evolving cyberattack landscape: What to expect in the future

In today’s increasingly digitized world, cybersecurity has become an essential concern for individualsĀ and businesses alike. With more and more data being transmitted and stored online,...

General 6 min read Read

Lessons from LastPass: The time when BYOD became BYOB (bring your own breach)

Picture this: It’s a regular WFH day, but you are unaware of a hacker sitting in some basement, rubbing their hands together in glee as...

Desktop & Mobile , Endpoint Central , General , ManageEngine 4 min read Read

OpManager Enterprise edition: Optimized features for scalability

Monitoring an enterprise network is challenging for two reasons: the size of the network and the distributed architecture it follows. In the distributed model, branches...

General , OpManager 3 min read Read

Beyond the ransom: Unpacking the true cost of a ransomware attack

Ransomware has become a significant threat in today’s digital landscape, with cybercriminals using it as an effective means of making money, often with a low...

General 6 min read Read