General | March 24, 2026Are chatbots becoming more than just tools?There’s something oddly comfortable about talking to something that never interrupts or judges, and always has a response waiting. No need to over...
ADSelfService Plus | March 23, 20262FA vs. MFA: What’s the difference and which is more secure?In modern enterprise environments, compromised credentials remain one of the top causes of data breaches. That...
General | March 20, 2026Top tips: Protecting your data when the world feels unpredictableTop tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead....
Applications Manager | March 20, 2026Applications Manager now officially supports Podman monitoring!As organizations shift away from traditional container engines to embrace Podman’s rootless and daemon-less...
ADManager Plus | March 19, 2026What is segregation of duties, and why is it so important for compliance?Segregation of duties (SoD), also called separation of duties, is a concept which states...
ADSelfService Plus | March 18, 2026Securing the gateway: Why SSH 2FA is essentialIn an era where remote work is the widely adopted and cloud infrastructure is crucial to...
Applications Manager | March 16, 2026Why native AWS monitoring alone is not enough for modern applicationsAWS monitoring is critical for running reliable, business-critical applications in the...
ADSelfService Plus | March 13, 2026What is a replay attack, and how do you avoid falling victim?In today’s interconnected world, cyberthreats are constantly evolving. Among these threats...
General | March 13, 2026Five worthy reads: Beware: Your AI-generated output may be poisonedFive worthy reads is a regular column on five noteworthy items we have discovered while...
General | March 13, 2026Five worthy reads: Synthetic identities, the silent fraud epidemic scaling with AI Five worthy reads is a regular column on five noteworthy items we’ve discovered while...