-
Jul 18, 2019, 00:00 AM
by
Greg Mooney
In this Have You Met? podcast, we sat down with Daniel Hotz of QBITS, a Progress partner based in Switzerland, to see how they are implementing MOVEit managed file transfer in the various regions they serve clients.
Full story
-
Jul 9, 2019, 00:00 AM
by
Jeff Edwards
Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level...
Full story
-
Jul 5, 2019, 00:00 AM
by
Adam Bertram
In Azure automation, there exists a useful feature called Variables. Variables are assets in Azure Automation that allow you to set and query various values.
Full story
-
Jun 27, 2019, 00:00 AM
by
Missy Januszko
DevOps, the latest in software engineering and IT operations trends, defines a set of processes, tools, practices, and interactions that foster collaboration between developers and operations to achieve high-quality business outcomes. In this article, we are going to...
Full story
-
Jun 26, 2019, 00:00 AM
by
Eric Bruno
Scripting is a popular and powerful choice to automate repeatable file transfer tasks. It can be horrifying, though, to discover just how many scripts are relied on for the successful operation of your infrastructure. This and the time they take to execute are sure to...
Full story
-
Jun 26, 2019, 00:00 AM
by
Doug Bonderud
The Dark Web. You've heard the term. It pops up in mainstream news stories about illegal goods, stolen identities and credit card fraud. It's a kind of digital boogeyman for ordinary users and IT pros alike, making it easy to mistake fear for facts and hype for helpful...
Full story
-
Jun 25, 2019, 00:00 AM
by
Rick Robinson
This article will stick to the American usage — but remember that if you are operating globally, the terminology can get confusing.
Full story
-
Jun 24, 2019, 00:00 AM
by
Jeff Edwards
Ah, the cloud. It's changing the face of IT forever, and while it's at it, it's providing us with a never-ending stream of acronyms.
Full story
-
Jun 24, 2019, 00:00 AM
by
Greg Mooney
If you work in the cyber security field, chances are you've run into current or former black hats. But some of these hackers have put their dark pasts behind them and are doing great things in the world cyber security research today. The big question is should an...
Full story
-
Jun 21, 2019, 00:00 AM
by
Dan Franciscus
A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.
Full story
-
Jun 19, 2019, 00:00 AM
by
Jeff Edwards
DevOps! Over the past half-decade, the illustrious marriage between Development and Operations has simultaneously become the biggest buzzword in tech since ~The Cloud~, and a critical piece of software engineering and delivery methodology. But to many, the DevOps...
Full story
-
Jun 14, 2019, 00:00 AM
by
Adam Bertram
Once upon a time back in 2006, PowerShell was introduced to the world. The scripting language thought up by Jeffrey Snover and distributed by Microsoft with Windows would soon turn into a ubiquitous part of IT automation and scripting, replacing the aging VBScript as the...
Full story
-
Jun 12, 2019, 00:00 AM
by
Greg Mooney
Large scale data migrations are a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.
Full story
-
Jun 10, 2019, 00:00 AM
by
Adam Bertram
By integrating this REST API in, not only does it show how you can leverage AirTable and Azure, but how you can integrate just about any REST API out there into Azure DevOps.
Full story
-
Jun 10, 2019, 00:00 AM
by
Adam Bertram
Artificial intelligence (AI) is being applied across an ever-increasing range of services. One of those applications is in the text to speech realm.
Full story
-
Jun 10, 2019, 00:00 AM
by
Adam Bertram
When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.
Full story
-
Jun 5, 2019, 00:00 AM
by
Jeff Edwards
Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...
Full story
-
May 29, 2019, 00:00 AM
by
Greg Mooney
If you are doing business in Australia, then you will need to study up on the Federal Privacy Act 1988 and its underlying principles.
Full story
-
May 24, 2019, 00:00 AM
by
Adam Bertram
The Windows event logs are a great place to start when troubleshooting problems or investigating potential security breaches.
Full story
-
May 20, 2019, 00:00 AM
by
Mark Towler
If you’re planning on taking advantage of a Software-as-a-Service MFT solution you need to consider several key features to ensure you’re getting something that will meet all your requirements.
Full story