The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities. And not a second too soon, since every week seems to usher in another security catastrophe. This week’s shocker was the outing of a hole in mobile device SIM cards, by Karsten Nohl, the founder of Security Research Labs in Berlin
EMA puts OpManager in catbird seat against a morass of expensive & complex tools from Big4!
ManageEngine introduced huge enhancements to OpManager recently making it the industry’s most cost-efficiently scalable network management platform.
This Week’s Five: Managed Service Providers – Reality Check!
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll try to find out how Managed Service Providers (MSPs) are an important part of the burgeoning IT management space . Why does an enterprise hire an MSP? Cost-saving is the major reason, but other key benefits like using professional talent, more concentration on their core job, and reduction of risk and hassles, are in fact more critical to the success of their long-term strategies
Work Anywhere, Anytime with ManageEngine
Vacations are not the easiest to plan for any professional, especially an IT professional.
This Week’s Five: SysAdmins are not humans, seriously!
Your network is safe, your computer is working, and your printer is running.
Open Source Software: The Hidden Cost of Free
Recently, Michael Skok wrote that “ open source is eating the software world .” As general partner at North Bridge Venture Partners, Skok should know.
Will mobile devices replace desktops in enterprises?
We keep hearing new concepts around mobile devices every passing day. BYOD, BYOA, MDM, MAM etc. have become the buzz words of IT industry. Are mobile devices slowly replacing desktops at work?
This Week’s Five: Active Directory Management & Beyond
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll explore the developments in active directory management.
IT outsourcing: When outsiders become insiders, how do you ensure information security?
Organizations outsource a part or whole of their IT services to third-party service providers for various reasons, such as cost savings, leveraging outside expertise, need to meet business demands quickly, and other critical aspects. Usually, tasks such as software development, network management, customer support, and data center management are outsourced
Security Gaffes You Might Have Missed So Far This Year
If you can believe it, 2013 is already halfway over. With summer here, businesses everywhere are feeling the heat in their IT organizations – as they fight a growing array of security concerns, threatening their profitability and reputation alike.