Operations | Monitoring | ITSM | DevOps | Cloud

October 2019

How to Keep Malware Out of Your Printers

The landscape of cybersecurity is always changing, and new threats are constantly emerging. One of the newest – and the most interesting, if you are into that kind of thing – is the rise of printer malware. This type of malware started to be reported in November 2017, when Barracuda Labs saw an attack where cybercriminals spoofed a printer to send a malicious attachment that appeared to be a legitimate file sent by a network printer.

8 Top Robotic Process Automation (RPA) Tools

By Des Nnochiri Robotic process automation, or RPA, promises to increase efficiency and improve work rates at reduced cost to the enterprise. In this article, we’ve assembled eight of the top RPA tools currently on the market. Of course, there are considerations to bear in mind before implementing this emerging technology.

How to Manage Linux Logs

Log files in Linux often contain information that can assist in tracking down the cause of issues hampering system or network performance. If you have multiple servers or levels of IT architecture, the number of logs you generate can soon become overwhelming. In this article, we’ll be looking at some ways to ease the burden of managing your Linux logs.