Credit to Author: Jonathan Hassell| Date: Wed, 13 Dec 2017 03:00:00 -0800
I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks you already have to do as part of your regular role and responsibilities. In a previous article, I demonstrated how to accomplish five common administrative tasks using PowerShell.
Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.
Credit to Author: John Powers| Date: Tue, 12 Dec 2017 18:30:16 +0000
Corporate, industrial, and institutional (C&I) buyers are choosing renewable energy power purchase agreements (PPAs) for three primary reasons. As they stand today, federal subsidies and technology improvements make both wind… Read more »
Credit to Author: Trend Micro| Date: Tue, 12 Dec 2017 15:04:37 +0000
Our list may not have quite the jingle of the holiday carol favorite, but keeping these threats in mind can help IT and business leaders position their company for protection and success heading into 2018.
Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 12 Dec 2017 13:00:36 +0000
Lean Manufacturing brings significant benefits to industry, including cost reduction, quality improvement, reduced cycle time, and greater customer satisfaction (See “The Machine that Changed the World”, Womak, J., Jones, D., and Roos, D., Free, Press, 1990 for the groundbreaking analysis of Toyota’s Lean Production). Can Information Technology organizations apply Lean to cybersecurity? The core challenge…
Credit to Author: Trend Micro| Date: Mon, 11 Dec 2017 16:05:35 +0000
As businesses work to attract talent, they must still be able to maintain their security stance and protect the organization’s IT and data assets from prying, malicious actors.