• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:security

General | August 23, 2013

This Week's Five: What's buzzing in IT!

This Week’s Five is a weekly column of five interesting reads from all over the web. This...

ADManager Plus | August 14, 2013

5 Top Targets for Today’s Hackers

Black Hat USA bills itself as “the show that sets the benchmark for all other security...

ADManager Plus | August 10, 2013

Your Net Worth Is Online – And Less Safe Than Ever

The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together...

Password Manager Pro | July 17, 2013

Security Gaffes You Might Have Missed So Far This Year

If you can believe it, 2013 is already halfway over. With summer here, businesses...

ADManager Plus | April 29, 2013

HIPAA Omnibus Rule: New Penalty system with steeper fines

The passage of HIPAA Omnibus Rule heralds a new era of accountability for organizations...

ADManager Plus | April 15, 2013

HIPAA Omnibus Rule: Should your organization’s IT department fret over it? -- Part II

In the first part of this 2-part blog, we saw the update about the HIPAA Omnibus Rule and...

ADManager Plus | April 10, 2013

HIPAA Omnibus Rule: Should your IT department fret over it? -- Part I

Today, the entire healthcare industry is abuzz over the latest development – the HIPAA...

ADManager Plus | April 9, 2013

Voices that matter - Identity and Access Management

Lately, the digital identities of users have evolved into playing a significant role in...

Password Manager Pro | March 20, 2013

Could Your Jewelry Stop Hackers?

Google has been talking about an innovative idea to replace passwords with jewelry — that...

Endpoint Central | March 5, 2013

6 Reasons Your Company Should Have Its Own App Store

Just as enterprise IT departments are starting to get a handle on the bring your own...

Endpoint Central | February 25, 2013

Now, track "who did what" with USB audit feature

Now, Desktop Central is equipped with USB device auditing feature that helps you to...

Endpoint Central | February 12, 2013

NFC or “Near Field Communication” – a word of Advice

Most of us know about NFC or Near Field Communication. We would like to define it once...

Page 10 of 11« First«...891011»Last »