The other day I was asked the to run a report by security team on which AD users had dial-in configured for a static IP address and what IP address...
One editor many Languages – Visual Studio Code
I have been working a lot with Power Shell ISE and debugging scripts, PS ISE is good but not the best as a debugger. I was attending a Microsoft...
Fixing Web Recording in SCOM 2012 R2
Hello fellow monitoring aficionados, Today we’re going to be talking about Web Transaction Monitoring. Specifically, the issues with getting...
Server 2016 TP5
Server 2016 is right around the corner and I'm sure everyone has copious amounts of free time to learn about the new features in Server 2016...No?...
The Pursuit of a Low Effort ZTI
Recently I was engaged on a project to consolidate an SCCM 2012 environment and bring it up to the current branch version of 1602. One of the...
All Recent Posts
The Hidden Dangers of Unauthorized Access: Why Ignoring These 98 Security Measures Puts Your Business at Risk
In the modern enterprise, unauthorized access is one of the most significant...
Enterprise Risk Management: Addressing System Compromise
In today’s hyper-connected digital landscape, system compromise remains one of the most pressing...
Cybersecurity Situational Awareness: The Overlooked Pillar of Enterprise Risk Management
In an era where cyber threats evolve faster than many organizations can respond, situational...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.