<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | Read. Reflect. Reboot.

Posted on 10.12.17 by Greg Mooney

PowerShell Vs. The World

Debates between users of different scripting languages can be heated as everyone tries to defend their personal favorite as “the best.” It’s not necessarily clear what could objectively make one language “better” than another overall, though. Here is what PowerShell guru...

Posted on 10.11.17 by Adam Bertram

How to Create Simple Server Monitors with PowerShell

Want to keep an eye on how your servers are doing? Here's a guide on using PowerShell to get yourself started in the right direction.

Posted on 10.05.17 by Michael O'Dwyer

When Employers Truly Get Under Your Skin

Why would an employer consider biometric microchips for employees? 

Posted on 10.03.17 by Kevin Conklin

10 hacks for Safer Cyber Citizenship

Chances are cyber criminal already have all your personal data. Now is the time to up your game with this series of 10 Hacks for Safer Cyber Citizenship.

Posted on 10.03.17 by Adam Bertram

How Do You Install Python?

To kick off our series on Python from a PowerShell guy’s perspective, the first thing we have to do is install Python.

Posted on 10.02.17 by Kevin Conklin

UK Data Protection Bill 2017 - Cordery Compliance Video

Our friends at Cordery Compliance have just issued their latest in a series of videos concerning the upcoming GDPR and the UK's Data Protection Bill 2017 and it is well worth the watch. 

Posted on 10.02.17 by Jeanne Hopkins

The Changing Role of the CIO (Part 2)

Within each enterprise, savvy CIOs are undergoing transformation, too – from a role as service provider for other departments to strategic corporate leader.

Posted on 09.29.17 by Dan Franciscus

Chocolatey Is Quite Yummy

When it comes to package management, Windows has historically been far behind Linux. With Chocolatey, Windows users can now get a taste of something "yummy." 

Posted on 09.28.17 by Monica Gupta

MOVEit Secure File Transfer: 3 Deployment Methods

Each MOVEit deployment option promises to securely transfer your sensitive data from point A to point B. While one option isn’t better than the others, one may fit you best.

Posted on 09.27.17 by Missy Januszko

Setting Up Red and Blue security teams

Defending against new threats is a never-ending battle, and in that battle, regular penetration testing becomes a great weapon in a security team’s arsenal.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.