Hey, everybody. Hope you are doing well. If you're not, you are about to be doing better, for I am going to embed a pre-release of "The Force...
Which Automation Engine is Right for Your Organization?
I've recently been working with a few different organizations on server automation projects. If you have been following the Microsoft automation...
Using Orchestrator Variables
One of the great many features of System Center Orchestrator 2012 R2 is the ability to create reusable "Variables". Now I use the term Variable...
Installing Updates with Orchestrator
I have recently been working on a few projects where I have been working on patching solutions with either Orchestrator or SMA. It is almost...
SCO: Run .NET Script Workarounds for PowerShell
Greetings and Felicitations, readers! This week's blog post is on the subject of System Center Orchestrator and the very useful, yet sometimes...
All Recent Posts
The Invisible Threat: How Non-Technical Attacks Lead to Data Breaches and How to Prevent Them
When we think of cybersecurity breaches, we often picture elite hackers launching advanced attacks...
Third-Party Cybersecurity Exposure: Top 5 Actions to Safeguard Your Enterprise Risk Management Strategy
In today’s interconnected business environment, third-party relationships are critical to...
The Hidden Dangers of Unauthorized Access: Why Ignoring These 98 Security Measures Puts Your Business at Risk
In the modern enterprise, unauthorized access is one of the most significant...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.