• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:security

Backup basics: Ensuring data security in an uncertain world

RecoveryManager Plus | March 15, 2024

Backup basics: Ensuring data security in an uncertain world

In today's digital age, where data is the lifeblood of businesses and individuals alike,...

Rogues on the rise: Is your network secure enough? [E-book]

OpUtils | April 5, 2023

Rogues on the rise: Is your network secure enough? [E-book]

As your modern IT infrastructure scales, so do the blind spots, gray areas, threats, and...

How low-code platforms can help eliminate shadow IT in your organization

General | March 7, 2023

How low-code platforms can help eliminate shadow IT in your organization

Businesses are constantly trying to up their game in the digital transformation era....

Top 5 webinars of 2022

Log360 | March 6, 2023

Top 5 webinars of 2022

When it comes to cybersecurity, being in step with the current landscape and newest...

9 tips to master the art of software installation

Endpoint Central | November 1, 2022

9 tips to master the art of software installation

IT admins face pressure from all sides. Besides tracking and securing data across devices...

Cyberattacks and protecting your cloud services [E-book]

M365 Manager Plus | May 20, 2022

Cyberattacks and protecting your cloud services [E-book]

2021 saw an increase in most types of cyberattacks. The number of ransomware attacks rose...

NOBELIUM's phishing attacks: How to protect your Microsoft 365 setup [E-book]

M365 Manager Plus | April 25, 2022

NOBELIUM's phishing attacks: How to protect your Microsoft 365 setup [E-book]

In 2021, the Microsoft Threat Intelligence Center discovered a new malicious email...

Endpoint management: A must-have for the financial sector

General | April 7, 2022

Endpoint management: A must-have for the financial sector

It's almost that time of the year to file taxes in Portugal, so John opens the email he...

Five worthy reads: The emerging threat of weaponized artificial intelligence

General | March 25, 2022

Five worthy reads: The emerging threat of weaponized artificial intelligence

Illustration by Dorathe Victor Five worthy reads is a regular column on five noteworthy...

Massive ransomware attacks of 2021 and how to avoid them

Endpoint Central | February 9, 2022

Massive ransomware attacks of 2021 and how to avoid them

2021 brought a new wave of cyberattacks that proved to be detrimental to the era of...

Five worthy reads: Understanding quantum computing and its impact on cybersecurity

General | March 12, 2021

Five worthy reads: Understanding quantum computing and its impact on cybersecurity

Five worthy reads is a regular column on five noteworthy items we discovered while...

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

General | October 24, 2020

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Illustration by Ilamparithi Raju Five worthy reads is a regular column on five noteworthy...

Page 1 of 11123...»Last »