• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:datasecurity

World Backup Day: Tips for a successful small business backup strategy

General | March 28, 2023

World Backup Day: Tips for a successful small business backup strategy

In today's digital economy, businesses have access to more data than ever. As newer...

Five worthy reads: Why should we worry about cyberwarfare in 2023?

General | February 10, 2023

Five worthy reads: Why should we worry about cyberwarfare in 2023?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Are you fishing for tips to thwart phishing scams?

General | November 21, 2022

Are you fishing for tips to thwart phishing scams?

"You've inherited a fortune. To transfer the money, I need your bank account credentials....

The recovery: How to overcome a malware attack

General | October 27, 2022

The recovery: How to overcome a malware attack

A report published by Cybersecurity Ventures predicts that by 2031, ransomware will...

How important is cryptography in network security?

General | October 18, 2022

How important is cryptography in network security?

"Please enter the one-time-password (OTP) that has been sent to your registered mobile...

Understanding Saudi Arabia's new Personal Data Protection Law

General | December 29, 2021

Understanding Saudi Arabia's new Personal Data Protection Law

The processing of data is a long-standing debate among governments, businesses, and tech...

Mobile Device Manager Plus | December 14, 2020

Remote troubleshooting made easy with Mobile Device Manager Plus

System administrators play a vital role in every organization's IT department, and one of...

Mobile Device Manager Plus | December 11, 2020

How a mobile device management solution can help with securing devices in the digital workspace

The past decade has witnessed many organizations adapting to a digital workspace,...

General | October 21, 2020

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing...

Five worthy reads: Ethical AI: Why is it the need of the hour?

General | August 28, 2020

Five worthy reads: Ethical AI: Why is it the need of the hour?

Five worthy reads is a regular column on five noteworthy items we have discovered while...

Page 2 of 10«12