Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Tailor alarm content to your specific needs using Alarm Modifier

DevOps teams use a number of monitoring, project management, log management, and other IT management tools to receive alerts when something’s up. While this helps IT teams keep their system up and running at all times, the content of the alerts sent by some applications might not be relevant or insightful to the technicians who work on those issues. Now, with the Alarm Modifier feature, you can add new fields to an alarm, modify existing fields, rename fields, or remove them altogether.

Enhanced change management in ServiceDesk Plus: 5 tips to simplify your change implementations

Do you manage your organization’s IT infrastructure? Then you’ve probably dealt with change management in some capacity. IT change management—in particular—is an IT service management (ITSM) process where alterations to some or all the components in an organization’s IT infrastructure are planned, managed, and implemented. These changes need to happen without impacting service availability or business continuity.

Five worthy reads: Machine learning, the next phase of cybersecurity

With the number of cyberattacks growing with each passing day, the need for increasingly sophisticated security systems has never been higher. Just when these ceaseless attacks had you at your wit’s end, machine learning may just restore some sanity to the cybersecurity scene.

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.