
Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.
Dan Franciscus | | IT Insights
In this article, I will dive into a Chocolatey package to show the important components.
Dan Franciscus | | Automation | IT Insights
There are times when you have a complex script that you just need to get into configuration management. Re-writing scripts into manifests is time-consuming, no doubt about it. In this article, I will show how to run PowerShell scripts from Puppet.
One of the excellent features of the new MOVEit Transfer 2018 product is the introduction of RESTful (REST) APIs. If you're not familiar with REST APIs, it boils down to an industry-standard way of accessing applications or services over HTTP/S.
Dan Franciscus | | Automation | Cloud | IT Insights
The majority of organizations are not going to use one specific provider to host their systems. Whether it be VMware on-premises, Azure in the cloud, AWS, or Hyper-V, most will be operating on more than one.
Jeff Edwards | | Automation | Cloud | IT Insights
One of the new features of Ipswitch's MOVEit Automation 2018 product is the introduction of REST APIs. In this video from Ipswitch contributor Adam Betram, we'll cover how to use PowerShell to first authenticate to a MOVEit Automation server and then we'll cover how to...
For the purposes of this post, we are concerned with two relevant options, namely File Transfer Protocol (FTP) and Managed File Transfer (MFT). The second, being managed, obviously offers more features than a standard file transfer solution. But, which solution is best...
Basic details of your computer like operating system and version, memory, network adapter and hard drive are never stored in one central location.
Dan Franciscus | | IT Insights
One “free” solution for deploying Chocolatey packages remotely is PowerShell. Using PowerShell remoting techniques, software can be deployed in parallel on many different machines at once. In this article, I will demonstrate this.
Adam Bertram | | Security
Attackers wanting to steal your information online are some of the most creative people alive. It’s amazing how many ways they can come up with to steal your information. One of those ways is through a technique called cross-site scripting or XSS for short.
In this article, we will discuss how to get around the infamous double-hop problem in PowerShell. It's easier than you think.
Nate Lewis | | Security
We’re living in the age of information. In both the world of the enterprise and in our own personal lives, we expect speed first and foremost. The exchange of data between customers, employees, and partners is become a critical component of business operations. Shadow IT...
In this article, we provide three tips to help you become more efficient with PowerShell commands. We will specifically cover how to streamline your efforts in searching for text inside of strings, transforming MSQL data into both XML and JSON, and building XML schemas.
Greg Mooney | | Security
Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.
Today marks the 18th Sysadmin day since it was first founded by Ted Kekatos on July 28th, 2000. In honor of Sysadmin day—and the daily struggle of all IT Professionals, we present to you the Sysadmin Survival Guide, a collection of the best sysadmin resources from here...
Basic details of your computer like operating system and version, memory, network adapter and hard drive are never stored in one central location. You always have to go clicking around for it. But if you've got Python installed, we can build a script that collects all of...
Julianna Bernardi | | Security
If you work in IT for a regulated industry, security is one of your top priorities. Especially when working for the government, healthcare or finance, it is extremely important that products and services adhere to government-approved security requirements to ensure that...
Greg Mooney | | Security
External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.
Functions are a common occurrence in PowerShell and to truly understand the PowerShell language, it's important that you know how functions work. In this article, we're going to show how a PowerShell function evolves from basically nothing all the way to having...
Greg Mooney | | Security
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.