Subscribe to get all the news, info and tutorials you need to build better business apps and sites
In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.
Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions.
Azure Blueprints provide a "one-stop shop" for Azure governance. By implementing JSON templates and a controlled, unified workflow, Azure administrators can define, deploy, enforce, and maintain standardized Azure environments.
I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.
For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory.
If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...
Plan, practice, and then keep on practicing! It sounds so simple, but those are the keys for IT teams who have to respond to a disaster delivered by Mother Nature—whether it’s a flood, fire, earthquake, or a major storm such as a hurricane or tornado.
How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.