Don’t ever assume that code is obvious. Write your PowerShell code like you're writing it for your grandma.
The cybersecurity skill gap is a growing problem in the IT industry. Simply, the skill shortage needs to be fixed in order to fight the growing cybersecurity threat landscape.
Dan Franciscus | | IT Insights
Vagrant is one of those tools that you may have heard about before but just have not used yet, but once you decide to use it, it will probably end up in your tool belt.
A detailed guide on creating a FTP script in PowerShell to move files between servers.
The blockchain is a disruptive technology, and its implications are not fully understood yet. Here is how the blockchain could change the audit world.
Kevin Conklin | | Cloud | Cloud Computing | Security
The cloud can be just as secure as on-premise, but a comprehensive defensive framework is essential.
Adam the Automator describes taking the leap from being a PowerShell guy to learning a new scripting language in Python.
Michael O'Dwyer | | IT Insights
Why is it that lawyers are slow to adopt technology when it comes to all that paper?
Greg Mooney | | Security
The spiritual successor to the Mirai botnet is now looming inside millions of IoT devices. Will it wreak havoc on the Internet, or can we stop it in its tracks?
For Windows IT professionals, perhaps the most popular set of troubleshooting tools is Sysinternals, the creation of none other than Mark Russonivich, Microsoft’s CTO of Azure.
Jeanne Hopkins | | IT Insights
Branding is a new concept in the financial industry, if you consider the industry goes back to ancient civilization. However, it's critical to success in today's environment.
Missy Januszko | | IT Insights
Here is a proper tutorial to building your first Linux box from the perspective of a Windows person.
Chances are cyber criminal already have all your personal data. Now is the time to up your game with this series of 10 Hacks for Safer Cyber Citizenship.
Dan Franciscus | | IT Insights
When it comes to package management, Windows has historically been far behind Linux. With Chocolatey, Windows users can now get a taste of something "yummy."
Monica Gupta | | Security
Each MOVEit deployment option promises to securely transfer your sensitive data from point A to point B. While one option isn’t better than the others, one may fit you best.
Missy Januszko | | IT Insights
Defending against new threats is a never-ending battle, and in that battle, regular penetration testing becomes a great weapon in a security team’s arsenal.
Jeanne Hopkins | | IT Insights
By showing the way to mine data quickly and use it effectively, IT managers will become our data heroes.
Kevin Howell | | Security
The IoT presents unique security challenges that enterprises will have to solve fast.
In this PowerShell tutorial, we will cover a few ways to interactively prompt a user for input.
Greg Mooney | | Security
Permanent patches sometimes take months to deploy—leaving digital assets open to attack. That's where virtual patching comes into play.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.