
Michael O'Dwyer | | IT Insights
Why is it that lawyers are slow to adopt technology when it comes to all that paper?
Greg Mooney | | Security
The spiritual successor to the Mirai botnet is now looming inside millions of IoT devices. Will it wreak havoc on the Internet, or can we stop it in its tracks?
For Windows IT professionals, perhaps the most popular set of troubleshooting tools is Sysinternals, the creation of none other than Mark Russonivich, Microsoft’s CTO of Azure.
Jeanne Hopkins | | IT Insights
Branding is a new concept in the financial industry, if you consider the industry goes back to ancient civilization. However, it's critical to success in today's environment.
Missy Januszko | | IT Insights
Here is a proper tutorial to building your first Linux box from the perspective of a Windows person.
Chances are cyber criminal already have all your personal data. Now is the time to up your game with this series of 10 Hacks for Safer Cyber Citizenship.
Dan Franciscus | | IT Insights
When it comes to package management, Windows has historically been far behind Linux. With Chocolatey, Windows users can now get a taste of something "yummy."
Monica Gupta | | Security
Each MOVEit deployment option promises to securely transfer your sensitive data from point A to point B. While one option isn’t better than the others, one may fit you best.
Missy Januszko | | IT Insights
Defending against new threats is a never-ending battle, and in that battle, regular penetration testing becomes a great weapon in a security team’s arsenal.
Jeanne Hopkins | | IT Insights
By showing the way to mine data quickly and use it effectively, IT managers will become our data heroes.
Kevin Howell | | Security
The IoT presents unique security challenges that enterprises will have to solve fast.
In this PowerShell tutorial, we will cover a few ways to interactively prompt a user for input.
Greg Mooney | | Security
Permanent patches sometimes take months to deploy—leaving digital assets open to attack. That's where virtual patching comes into play.
A hardware keylogger can be installed by anyone with access to the space and the nerve to do it.
All professions benefit from participation in a connected world and legal is no exception, as the digitization of everything continues unabated.
The PowerShell scripting language has been called “automation glue” more times than I can count.
Kevin Howell | | Security
Biometrics are definitely better than passwords when it comes to security, but they aren't fool-proof. Here are the three main reasons biometrics aren't secure.
Kevin Howell | | Security
Convenience and productivity shouldn't supercede security. When employees need to access data on their phones, proper security measures should be in place.
Jeanne Hopkins | | IT Insights
Employers want to see both hard and soft skills in potential employees. Here are some examples to keep in mind.
When trying to list all profiles, you need a script that can account for a variety of scenarios.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.