Summary This post describes how to use the "Do...Until" loop in PowerShell scripts. Introduction Happy Holidays, everyone. One...
Adding a Hybrid Runbook Worker for Azure Automation
Hey, everybody. Hope you are doing well. If you're not, you are about to be doing better, for I am going to embed a pre-release of "The Force...
SCOM: Access Performance Data with PowerShell
Summary This post describes how to access performance data from SCOM via PowerShell. Introduction One of the most useful...
Use PowerShell to Automate Remote Desktop Connection Manager 2.7 Setup
An issue arises Like many others, I use Microsoft’s Remote Desktop Connection Manager (RDC Man) daily to connect to the Servers I administer. It is...
Initiating Deployed Applications and Task Sequences Using PowerShell
Howdy. I've been spending the past month or so automating a lot of repeatable tasks, none of which have been groundbreaking. Yet, I don't want to...
All Recent Posts
Cybersecurity Situational Awareness: The Overlooked Pillar of Enterprise Risk Management
In an era where cyber threats evolve faster than many organizations can respond, situational...
Third-Party Risk: The Hidden Weak Link in Enterprise Security
In today’s digital-first business environment, companies rely on third-party vendors and service...
Why Lack of Internal Controls Is the Silent Threat to Enterprise Risk Management
In today’s rapidly evolving digital landscape, cybersecurity breaches are no longer a question of...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.