
Shadow IT is a real problem in the modern workplace. In this episode of Defrag This, we explore the reasons users turn to the dark side, the risks of unsanctioned IT stacks, and some of the solutions IT teams can use to curb Shadow IT.
Dan Franciscus | | Cloud | IT Insights
Amazon Web Services (AWS) is still the most popular cloud platform and Packer provides great integration that enables users to import builds into AWS and convert them to Amazon Machine Images (AMI).
Edgar Allan Mooney | | IT Insights
Once upon a blood moon, there was a sysadmin called Kyle and he almost lost it all to the ghost in the machine...
Nate Lewis | | File Transfer | Security
"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...
In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements.
Adam Bertram | | Automation | IT Insights
Running commands locally on the remote computers is a common task many IT admins have to do every day. Here's how you can do that in PowerShell.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.
Tired of managing Windows system administration tasks manually? Wish you could set up a few Python scripts instead? Where there's a will, there's a way! In this article, we'll show you how to install Python's WMI module and how you can use it to perform system...
Prateek Singh | | Cloud | IT Insights | Security
Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud. AWS IAM can prove very useful for System Administrators looking to centrally manage users,...
Nate Lewis | | Security
One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...
Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...
In this article, we'll take a look at how system administrators can use Python to manage their Amazon Web Services (AWS) Elastic Compute Cloud (EC2) infrastructure. You’ll learn to query existing EC2 instances, change the state of the virtual machines and their...
Producing great software is only half the battle--or more like 1/3 of the battle. Software is worthless until it gets in the hands of the people that want to use it. To do that, though, isn’t simple.
Nate Lewis | | File Transfer | Security
Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.
Dan Franciscus | | Automation | IT Insights
In this article, I will show how to configure a Vagrant box to run PowerShell.
Prateek Singh | | Automation | Cloud | IT Insights
In this article, we'll take a look at how Python can be used by System Administrators to automate the management of Amazon Web Services (AWS) Elastic Compute Cloud (EC2) infrastructure. You'll learn how to set up the Python scripting environment for first use, and how to...
Kevin Conklin | | File Transfer | Security
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.
With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.