Shadow IT is a real problem in the modern workplace. In this episode of Defrag This, we explore the reasons users turn to the dark side, the risks of unsanctioned IT stacks, and some of the solutions IT teams can use to curb Shadow IT.
Today is election day and voters are running to the polls to cast their vote. However, recent reports indicate that US citizens are not particularly confident in the technology used at the ballots.
Amazon Web Services (AWS) is still the most popular cloud platform and Packer provides great integration that enables users to import builds into AWS and convert them to Amazon Machine Images (AMI).
Once upon a blood moon, there was a sysadmin called Kyle and he almost lost it all to the ghost in the machine...
It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be.
"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...
In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements.
Running commands locally on the remote computers is a common task many IT admins have to do every day. Here's how you can do that in PowerShell.
Joining the Internet of Things phenomenon can generate valuable information for your business, but it also creates vulnerabilities that can threaten your digital assets.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...