• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:business

Five worthy reads: What is at stake when deepfake technology is on the make?

General | November 4, 2022

Five worthy reads: What is at stake when deepfake technology is on the make?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Users and passwords: Their behavior, your responsibility

ADSelfService Plus | March 3, 2020

Users and passwords: Their behavior, your responsibility

A team of researchers studied a group of users of different age groups, gender, and...

Is your business PCI DSS compliant? 

ADAudit Plus | February 17, 2020

Is your business PCI DSS compliant? 

How Chooseus Life Insurance lost its customers' cardholder details and their trust In...

Five worthy reads: Unlock untold business benefits with the GDPR

General | May 25, 2018

Five worthy reads: Unlock untold business benefits with the GDPR

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

[Free webinar]  ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support 

ServiceDesk Plus | August 18, 2017

[Free webinar]  ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support 

Lost business hours, change success rate, first call resolution rate, and SLA compliance...