• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Data Security

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

DataSecurity Plus | May 26, 2025

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal...

IT Security Under Attack: The ultimate playbook to counter cyberthreats

Log360 | February 26, 2025

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line...

Why educational institutions need robust cybersecurity solutions

ADManager Plus | September 24, 2024

Why educational institutions need robust cybersecurity solutions

Technology has been an integral part of the education industry, even before the onset of...

Data security threats: How to safeguard your data from modern pirates [Free e-book]

DataSecurity Plus | July 26, 2024

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...

ADManager Plus | June 26, 2024

Why outdated access control is putting your data at risk

Imagine this: you wake up to a notification - your company has suffered a data breach....

Top tips: Watch out for these 4 machine learning risks

General | April 4, 2024

Top tips: Watch out for these 4 machine learning risks

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

[Webinar] How to implement an effective data loss prevention strategy

Log360 | July 10, 2023

[Webinar] How to implement an effective data loss prevention strategy

Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...

How to comply with ISO 27001:2022 security controls using SIEM

Log360 | April 17, 2023

How to comply with ISO 27001:2022 security controls using SIEM

When it comes to compliance, all enterprises struggle to keep up with the latest versions...

Data sovereignty in the cloud: A Canadian perspective

General | April 3, 2023

Data sovereignty in the cloud: A Canadian perspective

Cloud computing has made its way to organizations' IT infrastructure strategy rapidly...

[Webinar] How to ace compliance in the era of stringent regulatory standards

Log360 | December 7, 2022

[Webinar] How to ace compliance in the era of stringent regulatory standards

The growing prevalence of hybrid work environments has introduced a host of problems,...

Overcome these 10 mobile device security pain points with MDM [E-book]

Mobile Device Manager Plus | May 10, 2022

Overcome these 10 mobile device security pain points with MDM [E-book]

In 2021, the number of unique mobile device users globally was estimated at around 5.22...

Revamp your backup strategy and redefine data security this World Backup Day!

Endpoint Central | March 31, 2022

Revamp your backup strategy and redefine data security this World Backup Day!

Did you know that March 31 is World Backup Day? Who knew data backup was important enough...

Page 1 of 4123...»Last »