dcsimg

How to write GDPR-compliant consent forms

The new consent requirements introduced in the GDPR (General Data Protection Regulation) mean you need to be extra vigilant when it comes to requesting information. The rules for lawful consent are much tougher than in the past, and savvy data subjects will be bound to query anything that seems suspicious.  You can be sure your data processing activities meet the GDPR’s consent … [Read more...]

Desktop as a Service, what is it and why use it? | Parallels

What is Desktop as a Service? Desktop-as-a-Service (DaaS) is a model of virtual desktop infrastructure (VDI) which is outsourced and managed by a third-party provider. Described also as hosted desktop services, desktop as a service is generally delivered as a cloud service along with the applications needed. How does DaaS work? A DaaS provider typically manages storage, security, and backups, as … [Read more...]

The Ins and Outs of Data-Centric Security

We’ve said it many times before, but it is worth emphasising; organizations need to be doing more about securing their data from the inside-out. Currently, as has been the case for numerous years, organizations are spending too much on perimeter security (which is, of course, important) and forgetting to focus on the thing that matters the most, the data itself. We speak to many organizations that … [Read more...]

A week in security (May 13 – 19)

Last week, Malwarebytes Labs reviewed active and unique exploit kits targeting consumers and businesses alike, reported about a flaw in WhatsApp used to target a human rights lawyer, and wrote about an important Microsoft patch that aimed to prevent a “WannaCry level” attack. We also profiled the Dharma ransomware—aka CrySIS—and imparted four lessons from the DDoS attack against the US … [Read more...]

Converting Text to Speech with Azure Cognitive Service’s REST-Based API

Artificial intelligence (AI) is being applied across an ever-increasing range of services. One of those applications is in the text to speech realm. … [Read more...]

Becca Stucky, Katie McCroskey and Kara Trovato of Thycotic Recognized as CRN’s 2019 Women of the Channel

Washington D.C., May 20, 2019 – Thycotic, a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, announced today that CRN®, a brand of The Channel Company, has named Becca Stucky, Senior Director of Demand Generation & Programs, Katie McCroskey, Director of Knowledge Management & Training, and Kara Trovato, Strategic National Partner Account Manager, … [Read more...]

The Four Key Features of Cloud MFT

If you’re planning on taking advantage of a Software-as-Service MFT solution you need to consider several key features to ensure you’re getting something that will meet all your requirements. … [Read more...]

5 More PowerShell Commands to Better Manage Active Directory

Recently we published a blog about five key PowerShell commands that you need to help you better manage Active Directory. As this blog was so well received, we decided to do a follow up. If you want to read the original blog, then click here. Before We Begin Before you get started, you’re going to have to import Module Active Directory. Without importing the corresponding module into the … [Read more...]

A Step-by-Step Process for Maximizing Technician Productivity

<p>This procedure covers the standard "routine" for a technician, and it aims to prevent them being “interrupt driven.”</p> <p>"Interrupt driven" means allowing yourself to be interrupted and then doing whatever interrupted you most recently. It's a very difficult habit to break. This process will not end interruptions, but it does provide a framework for … [Read more...]

4 Lessons to be learned from the DOE’s DDoS attack

Analysts, researchers, industry professionals, and pundits alike have all posited the dangers of the next-generation “smart grid,” particularly when it comes to cybersecurity. They warn that without the right measures in place, unscrupulous parties could essentially wreak havoc on the bulk of society by causing severe outages or worse. It is a real possibility, but up until now, it’s been … [Read more...]