Hardening your technology infrastructure in preparation for a DDoS attack

1 hour ago
Stephen M.W.

By establishing these 11 appropriate controls beforehand, your organization will be better positioned to withstand and survive a DDoS attack.

Microsoft App-V as an application virtualization solution: Pros & cons

If your shop is considering using App-V as an application virtualization solution, read this article first and weigh the pros…

4 hours ago

Ransomware threats: Cybercriminals take their wares to the next level

As companies and individuals harden their defenses against ransomware, hackers are creating new and more virulent ransomware threats.

21 hours ago

AWS vs. Google Cloud: After a big 2019, what does 2020 hold?

AWS is the public cloud market leader. But Google Cloud is catching up. One thing is sure: In the AWS-Google…

1 day ago

7 web design principles that are crucial to know for 2020

What is going to be significant in the world of web design over the course of 2020? Let’s take a…

1 day ago

Mobile device management with Microsoft Intune: An introduction

Microsoft Intune is a great and powerful tool. Here’s how to use it for mobile device management to keep track…

2 days ago

Phishing attack nets $2.3 million from Texas school district

A Texas school district found out how easy it is to become the victim of a phishing attack. In this…

2 days ago

Hyper-V virtual machine won’t start? Here are some fixes

There are many reasons that a previously perfectly functioning Hyper-V virtual machine won’t start. Here are some solutions to this…

2 days ago

SIEM tools to keep your business safe and secure in 2020

To detect and prevent cyberattacks, more organizations are relying on security solutions provided by SIEM tools. These are seven of…

3 days ago

Update: Cloning Azure environments using Azure Automation

Previously, we talked about cloning Azure environments for entire resource groups. But suppose you want to clone just a single…

3 days ago