6 key steps to develop a data governance strategy

Data governance at one time was typically the concern of IT managers, database administrators and other…

Query event logs with PowerShell to find malicious activity

Suspicious activity in your Windows environment should not be a surprise when reports of questionable incidents…

(ISC)² to train 100,000 cyber pros in UK

Up to 100,000 people who want to pursue careers in cyber security will be able to…

You’re doing cloudops planning too late

I often remember fondly the days of the waterfall software development life cycle. Each task had…

16 top data catalog software tools to consider using in 2022

Many organizations face a growing sprawl of data across various databases and other repositories in on-premises…

Top data center infrastructure management software in 2022

DCIM tools are becoming a necessity for most data centers, as managing complex computing operations with…

CyberUK 22: Five Eyes focuses on MSP security

The Anglophone Five Eyes intelligence alliance has issued a joint advisory, coinciding with the National Cyber…

The downside of ‘debugging’ ransomware

The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover…

Researchers devise iPhone malware that runs even when device is turned off

Classen et al. reader comments 57 with 41 posters participating, including story author Share this story…

Avoid clock skew issues with external time source setup

Timing is everything, and this is especially relevant in a Windows-based environment. The system clock has…

Translate »