Reading Time: 2 minutesWannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is...
Reading Time: 6 minutes
Contents:
1. Introduction2. Preparing the environment3. Attack analysis and prevention4. Conclusion
1) Introduction
Web applications are arguably the most important element of today’s...
Reading Time: 28 minutesComodo One. Understanding monitors in ITSM
What is ‘Monitoring’ in ITSM profiles ?
Monitoring settings allow administrators to define performance and availability...
An important step forwards for performance and scalabilityAfter two months of intensive development and testing, we’re proud to release the latest alpha of...