<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Posted on 01.24.20 by Greg Mooney

What is the Federal Information Security Management Act (FISMA)?

Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.

Posted on 01.22.20 by Michael O'Dwyer

Is SCP More Secure Than SFTP?

No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols.

Posted on 01.21.20 by Greg Mooney

5 Ways Employees Move Data and Why It's Detrimental to Data Security

Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible.

Posted on 01.16.20 by Michael O'Dwyer

What is Kubernetes?

Most answers to the question, “What is Kubernetes?” follow a pattern. It’s open-source. It’s a container-orchestration system. It automates application deployment, scaling, and management. All are true.

Posted on 01.13.20 by June Castillote

Install Free Let’s Encrypt SSL SAN Certificate for Exchange 2019

When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server. 

Posted on 01.07.20 by Greg Mooney

Security Considerations for Data in the Cloud

On-premise data centers vs. the cloud: which environment offers stronger data security?

Posted on 01.03.20 by Michael O'Dwyer

3 New Technologies That Will Make IT's Life Easier in 2020

The future is here and now! These are the top 3 new technologies that will make IT's life that much easier in 2020.

Posted on 12.30.19 by Greg Mooney

Podcast: Using Automation and Threat Modeling to Protect Your Network

Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues.

Posted on 12.27.19 by June Castillote

Part 5 - Getting Started with Azure Automation: Executing Runbooks and Logging

In this article, we’ll look at the ways to publish your draft runbook and to trigger it to run manually and linking it to a schedule. We’ll also look at how we can check the logs of the previous runbook executions.

Posted on 12.26.19 by Michael O'Dwyer

5 Cybersecurity Trends to Look Out for in 2020

2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.