-
Feb 19, 2020, 00:00 AM
by
Tim Warner
In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability.
Full story
-
Feb 17, 2020, 00:00 AM
by
Greg Mooney
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story?
Full story
-
Feb 17, 2020, 00:00 AM
by
Michael O'Dwyer
Disclaimer: This post should not be used to determine your CCPA obligations and does not offer legal advice. It is designed to inform, raise some questions and lead you to investigate further by consulting with attorneys with relevant experience in data privacy laws and...
Full story
-
Feb 12, 2020, 00:00 AM
by
Michael O'Dwyer
No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols.
Full story
-
Feb 11, 2020, 00:00 AM
by
Greg Mooney
This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational.
Full story
-
Feb 10, 2020, 00:00 AM
by
Michael O'Dwyer
The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996, and compliance was (and indeed is) necessary for all U.S. healthcare organizations.
Full story
-
Feb 9, 2020, 00:00 AM
by
Michael O'Dwyer
Most answers to the question, “What is Kubernetes?” follow a pattern. It’s open-source. It’s a container-orchestration system. It automates application deployment, scaling, and management. All are true.
Full story
-
Jan 29, 2020, 00:00 AM
by
Adam Bertram
In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use.
Full story
-
Jan 24, 2020, 00:00 AM
by
Greg Mooney
Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.
Full story
-
Jan 24, 2020, 00:00 AM
by
June Castillote
In this article, we’ll look at the ways to publish your draft runbook and to trigger it to run manually and linking it to a schedule. We’ll also look at how we can check the logs of the previous runbook executions.
Full story
-
Jan 23, 2020, 00:00 AM
by
Michael O'Dwyer
2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.
Full story
-
Jan 22, 2020, 00:00 AM
by
Dan Franciscus
Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.
Full story
-
Jan 20, 2020, 00:00 AM
by
June Castillote
In this article, we’ll prepare the test automation project and I’ll show you how to use these assets to test our draft runbook.
Full story
-
Jan 16, 2020, 00:00 AM
by
Michael O'Dwyer
The future is here and now! These are the top 3 new technologies that will make IT's life that much easier in 2020.
Full story
-
Jan 13, 2020, 00:00 AM
by
June Castillote
When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.
Full story
-
Jan 9, 2020, 00:00 AM
by
June Castillote
In this article, you will learn about Azure Automation Assets. You will also learn how to add assets to your automation account that your runbooks can then use at runtime.
Full story
-
Dec 30, 2019, 00:00 AM
by
June Castillote
In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook.
Full story
-
Dec 19, 2019, 00:00 AM
by
June Castillote
One of the most popular automation tools is Azure Automation and this will be a series of posts covering the introduction to Azure Automation, creating automation runbooks, dealing with assets, testing and publishing runbooks.
Full story
-
Dec 18, 2019, 00:00 AM
by
Dan Franciscus
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
Full story
-
Dec 9, 2019, 00:00 AM
by
Mike Kanakos
Active Directory is a directory service that maintains information about users, computers and related objects. Here is how you can find inactive user accounts.
Full story