
Michael O'Dwyer | | File Transfer | Security
No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols.
Greg Mooney | | Security
Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible.
Michael O'Dwyer | | Automation | IT Insights
Most answers to the question, “What is Kubernetes?” follow a pattern. It’s open-source. It’s a container-orchestration system. It automates application deployment, scaling, and management. All are true.
June Castillote | | IT Insights | Security
When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.
Greg Mooney | | Cloud | Security
On-premise data centers vs. the cloud: which environment offers stronger data security?
Michael O'Dwyer | | IT Insights
The future is here and now! These are the top 3 new technologies that will make IT's life that much easier in 2020.
June Castillote | | Automation | IT Insights
In this article, we’ll look at the ways to publish your draft runbook and to trigger it to run manually and linking it to a schedule. We’ll also look at how we can check the logs of the previous runbook executions.
2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.
June Castillote | | Automation | Cloud | IT Insights
In this article, we’ll prepare the test automation project and I’ll show you how to use these assets to test our draft runbook.
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
June Castillote | | Automation | IT Insights
In this article, you will learn about Azure Automation Assets. You will also learn how to add assets to your automation account that your runbooks can then use at runtime.
Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.
June Castillote | | Automation | IT Insights
In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook.
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.
June Castillote | | Automation | IT Insights
One of the most popular automation tools is Azure Automation and this will be a series of posts covering the introduction to Azure Automation, creating automation runbooks, dealing with assets, testing and publishing runbooks.
With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin.
Michael O'Dwyer | | IT Insights
Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.
In this post, PowerShell expert Tim Warner shows you how you can create a custom Azure Resource Role with PowerShell.
We've been able to define custom Azure resource roles for awhile now. Today I'll teach you how to create a custom Azure AD role.
Jeff Edwards | | Security
There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.