dcsimg

How to Install the Hyper-V PowerShell Module (updated for Windows Server 2019)

PowerShell gives you the best combination of power and simplicity when managing Hyper-V. Use this guide to install the PowerShell Module on Hyper-V. Read the post here: How to Install the Hyper-V PowerShell Module (updated for Windows Server 2019) … [Read more...]

Improving and Adapting Cybersecurity – A Black@Tenable Conversation with Harry Wingo

At Tenable, we like to say, “What we do matters.” This commitment doesn’t only apply to our cybersecurity solutions, but also our culture. We care about what we do, each other and the communities we serve. Last year, I cofounded Tenable’s first-ever Diversity and Inclusion Council, which brings together company leaders who believe in creating an environment that: Helps all employees feel welcome … [Read more...]

The Role of Artificial Intelligence in Cybersecurity

<p>Most cybercriminals use older, tried-and-true attack methods like basic phishing, malware, or ransomware. However, cybercriminals often develop new methods, add twists on old favorites to evade detection, or build exploits for vulnerabilities before a patch is ready.&nbsp;</p> Read More … [Read more...]

Mac adware is more sophisticated and dangerous than traditional Mac malware

As the data revealed in our State of Malware report showed, Mac threats are on the rise, but they are not the same type of threats experienced by Windows users. Most notably, more traditional forms of malware, such as ransomware, spyware, and backdoors account for over 27 percent of all Windows threats. That figure is less than 1 percent for Macs. Further, Mac malware is rather unsophisticated … [Read more...]

The Complete Guide to Scale-Out File Server for Hyper-V

Everything you need in order to plan, configure and optimize your SOFS infrastructure, focused primarily on Hyper-V scenarios Read the post here: The Complete Guide to Scale-Out File Server for Hyper-V … [Read more...]

Stalkerware and online stalking are accepted by Americans. Why?

Despite warnings from domestic abuse networks, privacy rights advocates, and a committed faction of cybersecurity vendors, Americans may be accepting and minimizing online stalking behaviors, including the use of invasive apps that can pry into a user’s text messages, emails, photos, videos, and phone logs. The limited opposition to these at-times abusive behaviors was revealed by a new study … [Read more...]

What is file transfer protocol (FTP)?

At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another.  … [Read more...]

What You Need to Know About Vulnerability Assessments

Vulnerability assessments are one of the best methods to take the pulse of your organization’s network security. Consider for a moment the lifecycle of a vulnerability – of any size – in the security of the network infrastructure that your organization relies upon. If discovered by malicious online actors, they may choose to exploit it. They can implement everything from dedicated denials of … [Read more...]

The GDPR: Legitimate interest – what is it and when does it apply?

The GDPR (General Data Protection Regulation) outlines six conditions under which organisations can process personal data. Contractual requirements, legal obligations, vital interests and tasks carried out in the public interest are all relatively self-explanatory, leaving consent and legitimate interest that need to be unpacked in more detail. We’ve covered consent before, so our focus here will … [Read more...]

Using AWS S3 Buckets in Automation Manager

It’s becoming increasingly more common for partners to deploy large files—whether it’s to deploy software updates, do OS upgrades, or help a customer with a project. The need to transfer large files is more important than ever and will continue to grow as applications and updates grow.  Amazon Web Services (AWS) has a fairly inexpensive offering called Simple Storage Service (S3), which … [Read more...]