<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 12.26.19 by Michael O'Dwyer

5 Cybersecurity Trends to Look Out for in 2020

2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.

Posted on 12.23.19 by June Castillote

Part 4 - Getting Started with Azure Automation: Testing Draft Runbooks

In this article, we’ll prepare the test automation project and I’ll show you how to use these assets to test our draft runbook.

Posted on 12.18.19 by Dan Franciscus

Protecting Local Credentials with LAPS

One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.

Posted on 12.16.19 by June Castillote

Part 3 - Getting Started with Azure Automation: Managing Assets

In this article, you will learn about Azure Automation Assets. You will also learn how to add assets to your automation account that your runbooks can then use at runtime.

Posted on 12.13.19 by Dan Franciscus

Setting Up A Persistent SSH Tunnel

Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.

Posted on 12.10.19 by Jeff Edwards

Avast CCleaner Hit by Another Attempted Attack: What's the Issue?

It happened again, the Avast CCleaner application has been targeted by another attempted supply chain attack. This most recent supply chain attack should serve as an important security reminder for everyone.

Posted on 12.09.19 by Michael O'Dwyer

A VPN is NOT A Security Tool! It's in the Name

Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network.

Posted on 12.04.19 by Greg Mooney

Nine Holiday Security Tips for E-Commerce Retailers

The holidays just might be “the most wonderful time of the year” as the old-time carol says. But for IT security teams that oversee e-commerce websites, the holidays can also be “the scariest time of the year.”

Posted on 12.02.19 by June Castillote

Part 2: Creating your first Azure Automation RunBook

In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook.

Posted on 11.27.19 by Dan Franciscus

Using Powershell Authenticode Certificates to Self-Sign Application

One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.