General | March 26, 2026Top tips to stop hackers from exploiting your office printersTop tips is a weekly column where we highlight what’s trending in the tech world and list practical ways to explore these trends. This week, we are...
RecoveryManager Plus | March 25, 2026The NotPetya attack: What it teaches us about cyber survivalIn June 2017, the world witnessed one of the most destructive cyberattacks in history: the NotPetya attack....
General | March 24, 2026Are chatbots becoming more than just tools?There’s something oddly comfortable about talking to something that never interrupts or judges, and always has...
ADSelfService Plus | March 23, 20262FA vs. MFA: What’s the difference and which is more secure?In modern enterprise environments, compromised credentials remain one of the top causes of data breaches. That...
General | March 20, 2026Top tips: Protecting your data when the world feels unpredictableTop tips is a weekly column where we highlight what’s trending in the tech world and share...
Applications Manager | March 20, 2026Applications Manager now officially supports Podman monitoring!As organizations shift away from traditional container engines to embrace Podman’s...
ADManager Plus | March 19, 2026What is segregation of duties, and why is it so important for compliance?Segregation of duties (SoD), also called separation of duties, is a concept which states...
ADSelfService Plus | March 18, 2026Securing the gateway: Why SSH 2FA is essentialIn an era where remote work is the widely adopted and cloud infrastructure is crucial to...
Applications Manager | March 16, 2026Why native AWS monitoring alone is not enough for modern applicationsAWS monitoring is critical for running reliable, business-critical applications in the...
ADSelfService Plus | March 13, 2026What is a replay attack, and how do you avoid falling victim?In today’s interconnected world, cyberthreats are constantly evolving. Among these threats...