Often, interaction with SQL is an important piece of any automated workflow. In Orchestrator and PowerShell, the process of running SQL queries and...
PowerShell Training: The “Do…Until” Loop
Summary This post describes how to use the "Do...Until" loop in PowerShell scripts. Introduction Happy Holidays, everyone. One...
Adventures in RemoteApp Publishing
I have been working on implementing a VDI setup for a small to medium sized organization that desires the ability to publish Remoteapps via the RDS...
Creating SCOM Alert Count Dashboard using the PowerShell Grid Widget
Creating dashboard using the PowerShell Grid widget can offer a lot of flexibility in the way you want to consume the data out of Operations...
Authentication Issues with Azure AD Connect with On-Prem ADFS 3.0
I recently had an engagement where a standard O365 redirect to on-premise ADFS 3.0 authentication was required. I ran into an odd configuration...
All Recent Posts
Cybersecurity Situational Awareness: The Overlooked Pillar of Enterprise Risk Management
In an era where cyber threats evolve faster than many organizations can respond, situational...
Third-Party Risk: The Hidden Weak Link in Enterprise Security
In today’s digital-first business environment, companies rely on third-party vendors and service...
Why Lack of Internal Controls Is the Silent Threat to Enterprise Risk Management
In today’s rapidly evolving digital landscape, cybersecurity breaches are no longer a question of...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.