<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | security

Posted on 10.26.17 by Kevin Conklin

PICNIC Podcast #8 - Security Analytics and Machine Learning

In this PICNIC podcast,  Kevin Conklin is talking about security analytics. What exactly are they? Can they help make us safer? Why aren’t they already helping?

Posted on 10.25.17 by Dan Franciscus

Tracing Malicious Activity on Windows with Sysmon

For Windows IT professionals, perhaps the most popular set of troubleshooting tools is Sysinternals, the creation of none other than Mark Russonivich, Microsoft’s CTO of Azure.

Posted on 10.25.17 by Greg Mooney

IoTroop Botnet - Reaper of the Internet

The spiritual successor to the Mirai botnet is now looming inside millions of IoT devices. Will it wreak havoc on the Internet, or can we stop it in its tracks?

Posted on 10.24.17 by Greg Mooney

Honeypots Catch Winnie-the-Pooh…And Hackers Too!

Honeypots defend digital assets by attracting cybercriminals and allowing their activities to be analyzed.

Posted on 10.19.17 by Jeanne Hopkins

PICNIC Podcast #7 - Investing in Innovation in IT Analytics

Big Data isn’t just for techies anymore. Dennis Drogseth chats about his new research report entitled Leaders in Advanced IT Analytics (AIA): A Buyer's Guide for Investing in Innovation

Posted on 10.12.17 by Kevin Conklin

PICNIC Podcast #6 - IT in the News

IT has been particularly newsworthy lately, although not always for great reasons.

Posted on 10.05.17 by Michael O'Dwyer

When Employers Truly Get Under Your Skin

Why would an employer consider biometric microchips for employees? 

Posted on 10.03.17 by Kevin Conklin

10 hacks for Safer Cyber Citizenship

Chances are cyber criminal already have all your personal data. Now is the time to up your game with this series of 10 Hacks for Safer Cyber Citizenship.

Posted on 10.02.17 by Kevin Conklin

UK Data Protection Bill 2017 - Cordery Compliance Video

Our friends at Cordery Compliance have just issued their latest in a series of videos concerning the upcoming GDPR and the UK's Data Protection Bill 2017 and it is well worth the watch. 

Posted on 09.28.17 by Monica Gupta

MOVEit Secure File Transfer: 3 Deployment Methods

Each MOVEit deployment option promises to securely transfer your sensitive data from point A to point B. While one option isn’t better than the others, one may fit you best.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.