-
Nov 4, 2018, 00:00 AM
by
Greg Mooney
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Full story
-
Nov 2, 2018, 00:00 AM
by
Mark Towler
Security policies are prone to change, and you need to keep your users up-to-date on those changes so that they won't violate the terms of the policy, but doing so is often easier said than done.
Full story
-
Oct 31, 2018, 00:00 AM
by
Edgar Allan Mooney
Once upon a blood moon, there was a sysadmin called Kyle and he almost lost it all to the ghost in the machine...
Full story
-
Oct 24, 2018, 00:00 AM
by
Adam Bertram
As we all try to do more with less with automation, we sometimes get to a point to where we've got a new problem. We're now running so many scripts and processes that, in the end, we're not sure what "done" looks like.
Full story
-
Oct 22, 2018, 00:00 AM
by
Dan Franciscus
There are times when you have a complex script that you just need to get into configuration management. Re-writing scripts into manifests is time-consuming, no doubt about it. In this article, I will show how to run PowerShell scripts from Puppet.
Full story
-
Oct 19, 2018, 00:00 AM
by
Alex Jablokow
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
Full story
-
Oct 15, 2018, 00:00 AM
by
Dan Franciscus
If your organization is serious about using Chocolatey as a means for Windows package management, then setting up your own internal package repository is a must.
Full story
-
Oct 10, 2018, 00:00 AM
by
Adam Bertram
In this article, we provide three tips to help you become more efficient with PowerShell commands. We will specifically cover how to streamline your efforts in searching for text inside of strings, transforming MSQL data into both XML and JSON, and building XML schemas.
Full story
-
Oct 10, 2018, 00:00 AM
by
Prateek Singh
Tired of managing Windows system administration tasks manually? Wish you could set up a few Python scripts instead? Where there's a will, there's a way! In this article, we'll show you how to install Python's WMI module and how you can use it to perform system...
Full story
-
Oct 8, 2018, 00:00 AM
by
Kathleen Burns
Biometrics are infiltrating the financial industry. As the digital age expands, it is important to find a balance between security and accessibility.
Full story
-
Oct 4, 2018, 00:00 AM
by
Dan Franciscus
In this article, I will dive into a Chocolatey package to show the important components.
Full story
-
Oct 3, 2018, 00:00 AM
by
Michael O'Dwyer
Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...
Full story
-
Oct 2, 2018, 00:00 AM
by
Prateek Singh
Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud. AWS IAM can prove very useful for System Administrators looking to centrally manage users,...
Full story
-
Oct 1, 2018, 00:00 AM
by
Kevin Howell
Biometrics are definitely better than passwords when it comes to security, but they aren't fool-proof. Here are the three main reasons biometrics aren't secure.
Full story
-
Sep 30, 2018, 00:00 AM
by
Dan Franciscus
With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!
Full story
-
Sep 28, 2018, 00:00 AM
by
Nate Lewis
One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...
Full story
-
Sep 27, 2018, 00:00 AM
by
Alex Jablokow
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Full story
-
Sep 25, 2018, 00:00 AM
by
Adam Bertram
Producing great software is only half the battle--or more like 1/3 of the battle. Software is worthless until it gets in the hands of the people that want to use it. To do that, though, isn’t simple.
Full story
-
Sep 25, 2018, 00:00 AM
by
Prateek Singh
In this article, we'll take a look at how system administrators can use Python to manage their Amazon Web Services (AWS) Elastic Compute Cloud (EC2) infrastructure. You’ll learn to query existing EC2 instances, change the state of the virtual machines and their...
Full story
-
Sep 24, 2018, 00:00 AM
by
Greg Mooney
At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another.
Full story