If 2017 was the year of the ransomware attack, then 2018 is shaping up to be the year of cryptojacking, at least with the way things are going so far.
In this article, I will show how to deploy the Chocolatey Agent Service which allows end users to use a GUI to choose what packages to install or uninstall.
Docker for Windows is a product offered by Docker that allows users to set up a Docker container on a client-based operating system (Windows 10).
US Government officials have announced a round of sanctions and criminal indictments against an alleged Iranian hacker network that targeted hundreds of universities, businesses, NGOs, and Government organizations world-wide.
GDPR is right around the corner in May, so let's defrag some of the myths associated with the General Data Protection Regulation (GDPR).
If you manage both Windows and Linux in your environment (which almost everyone does) why would you want to use more than one method to remotely manage computers?
When writing code, it's important to make it modular by decoupling the code as much as possible. Check out how to accomplish this with Pester tests.
You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This...
The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers.
Vagrant is an excellent tool used for testing out application deployments and scripts. It is lightweight, fast, and allows you to bring up environments quickly. Vagrant supplies several “provisioners” that allow boxes to be configured via shell script or using various...