HomeIT Management

IT Management

Palo Alto Networks Shifts Zero Trust To Application Layer

Palo Alto Networks has announced what it calls Zero Trust Network Access (ZTNA) 2.0, which shifts the focus of ZTNA from the network to...

Airiam’s Art Ocain on Preventing Fraud in the SME Market

I spoke with Art Ocain, VP of Cybersecurity and Incident Response at Airiam, about why small and mid-size enterprises are more prone to cyberattack...

Lenovo Expands SSG Offerings with PCCW Solutions Acquisition

Strategic relationships are commonplace in the tech industry and typically enable the vendors involved to better serve shared customers and markets. But a few...

4 Challenges of the SOC: How Decision Intelligence Can Help

Networks and the valuable data they hold are under attack as never before. That’s bad timing for today’s digital organizations, as they continue to...

3 Ways to Build AI Video Applications for Driver Safety

The use of a monitoring video feed has helped to identify potential safety risks on our roads. But it’s usually a reactive tool that...

Tackling IT Staff Burnout: 3 Best Practices

For IT staff on the frontlines, the stress – and potential for burnout – is an occupational health issue that needs to be looked...

Lenovo’s ‘Diversity by Design’ and Global Accessibility Awareness Day

There is a continuous flow of articles and opinion pieces discussing how the tech industry could and should clearly work harder at addressing the...

The 5 Elements of Intelligent Automation

What’s the goal of automation? Ask a 19th century factory owner and the answer would likely have been “efficiency.” Through automation, individual workers could...

Agent vs. Agentless in Cloud Security: Why Both are Needed

When researching how to start with or even improve cloud security, it won’t take long to stumble upon some sort of agent versus agentless...

Security and Backup Alignment Critical to Ransomware Recovery

Ransomware continues to plague organizations all over the world. The most common entry points of ransomware into enterprise IT environments are phishing emails, malicious...