Subscribe to get all the news, info and tutorials you need to build better business apps and sites
It's happened again, the Avast CCleaner application has been hit by another supply chain attack. This most recent supply chain attack should serve as an important security reminder for everyone.
Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network.
The holidays just might be “the most wonderful time of the year” as the old-time carol says. But for IT security teams that oversee e-commerce websites, the holidays can also be “the scariest time of the year.”
In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook.
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.
We like to assign blame. It seems it’s human nature to be totally knowledgeable in areas that don’t involve us at all.
One of the most popular automation tools is Azure Automation and this will be a series of posts covering the introduction to Azure Automation, creating automation runbooks, dealing with assets, testing and publishing runbooks.
Another way to ask this question is, “Do you like to gamble?” That’s usually what the decision to purchase any type of optional insurance comes down to. It’s no different for cyber insurance, which every size business needs to consider.
Active Directory is a directory service that maintains information about users, computers and related objects. Here is how you can find inactive user accounts.
With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin.