
Greg Mooney | | Cloud | Security
For years, security concerns kept many business leaders convinced it was too risky to migrate the IT environment to the cloud. But in recent years, there’s been a shift.
This article will stick to the American usage — but remember that if you are operating globally, the terminology can get confusing.
Adam Bertram | | Security
In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use.
Greg Mooney | | Security
Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.
Michael O'Dwyer | | File Transfer | Security
No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols.
Greg Mooney | | Security
Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible.
Michael O'Dwyer | | Automation | IT Insights
Most answers to the question, “What is Kubernetes?” follow a pattern. It’s open-source. It’s a container-orchestration system. It automates application deployment, scaling, and management. All are true.
June Castillote | | IT Insights | Security
When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.
Greg Mooney | | Cloud | Security
On-premise data centers vs. the cloud: which environment offers stronger data security?
Michael O'Dwyer | | IT Insights
The future is here and now! These are the top 3 new technologies that will make IT's life that much easier in 2020.
June Castillote | | Automation | IT Insights
In this article, we’ll look at the ways to publish your draft runbook and to trigger it to run manually and linking it to a schedule. We’ll also look at how we can check the logs of the previous runbook executions.
2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.
June Castillote | | Automation | Cloud | IT Insights
In this article, we’ll prepare the test automation project and I’ll show you how to use these assets to test our draft runbook.
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
June Castillote | | Automation | IT Insights
In this article, you will learn about Azure Automation Assets. You will also learn how to add assets to your automation account that your runbooks can then use at runtime.
Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.
June Castillote | | Automation | IT Insights
In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook.
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.
June Castillote | | Automation | IT Insights
One of the most popular automation tools is Azure Automation and this will be a series of posts covering the introduction to Azure Automation, creating automation runbooks, dealing with assets, testing and publishing runbooks.
With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.