Applications Manager | April 1, 2026Applications Manager now integrates with your SIEM platform! Applications Manager now supports integration with leading SIEM platforms, helping you...
ADManager Plus | March 31, 2026What is attack surface management? Attack surface management is the continuous process of monitoring, discovering, and...
ADSelfService Plus | March 30, 2026 Best multi-factor authentication apps for enterprises in 2026 Today, organizations operate in highly distributed environments where employees access...
General | March 26, 2026Top tips to stop hackers from exploiting your office printers Top tips is a weekly column where we highlight what’s trending in the tech world and list...
RecoveryManager Plus | March 25, 2026The NotPetya attack: What it teaches us about cyber survival In June 2017, the world witnessed one of the most destructive cyberattacks in history: the...
General | March 24, 2026Are chatbots becoming more than just tools? There’s something oddly comfortable about talking to something that never interrupts or...
ADSelfService Plus | March 23, 20262FA vs. MFA: What’s the difference and which is more secure? In modern enterprise environments, compromised credentials remain one of the top causes of...
General | March 20, 2026Top tips: Protecting your data when the world feels unpredictable Top tips is a weekly column where we highlight what’s trending in the tech world and share...
Applications Manager | March 20, 2026Applications Manager now officially supports Podman monitoring! As organizations shift away from traditional container engines to embrace Podman’s...
ADManager Plus | March 19, 2026What is segregation of duties, and why is it so important for compliance? Segregation of duties (SoD), also called separation of duties, is a concept which states...
ADSelfService Plus | March 18, 2026Securing the gateway: Why SSH 2FA is essential In an era where remote work is the widely adopted and cloud infrastructure is crucial to...
Applications Manager | March 16, 2026Why native AWS monitoring alone is not enough for modern applications AWS monitoring is critical for running reliable, business-critical applications in the...