dcsimg

How to Increase Collaboration Without Reducing Security

Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security. … [Read more...]

Did China Pull off the Biggest Hardware Hack in History?

For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government agents installed thousands of spy chips into servers used by Amazon, Apple, and the US government. How true are these allegations, … [Read more...]

Defrag This – Monitoring Security in AWS

How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors around the cloud at the API level, specifically AWS (Amazon web services). And being prepared to react fast. … [Read more...]

VIDEO: How to Discover Azure Virtual Machines in WhatsUp Gold 2018

A new feature in Ipswitch's WhatsUp Gold network monitoring product is the ability to monitor Azure Virtual Machines. In this video from Ipswitch contributor Adam Betram, we'll cover how to add an Azure credential to WhatsUp Gold and how to set up an initial discovery to discover all Azure Virtual Machines in a subscription. … [Read more...]

Six Peer-Reviewed Alternatives to Gartner and Forrester Reports

If you work in IT, or if you're in any position to evaluate and choose IT tools, chances are you're familiar with the names Gartner and Forrester. … [Read more...]

Video: How To Scan For—and Lock Down—Open Ports with WhatsUp PortScanner

Foot-printing your environment is the first step to identifying ways in which intruders can penetrate your network. Thankfully, we offer a free utility that helps with precisely this task! In this Snip, Anthony Howell shows you how to use Ipswitch's WhatsUp PortScanner to scan a host machine for open ports, then he'll show you how to harden your system using the host's firewall. … [Read more...]

Breaking Down the GDPR’s Data Protection Principles, Part 4: Integrity, Confidentiality, and Accountability

It’s been months since the EU’s landmark data protection regulation, the General Data Protection Regulation (GDPR) went into full effect. This means that companies around the world now have to be more careful about the way they handle personal data collected about residents of the EU to ensure the safety and privacy of this information. If they don’t, they could be subject to massive fines … [Read more...]

Video: How to Download Files From Azure Blob Storage with MOVEit Automation

 One of the new features of Ipswitch's MOVEit Automation 2018 product is the introduction of REST APIs. In this video from Ipswitch contributor Adam Betram, we'll cover how to use PowerShell to first authenticate to a MOVEit Transfer server and then we'll cover how to create and monitor a file transfer job using a PowerShell script. … [Read more...]

Video: Using MOVEit Transfer’s REST API to Transfer Files with PowerShell

One of the new features of Ipswitch's MOVEit Automation 2018 product is the introduction of REST APIs. In this video from Ipswitch contributor Adam Betram, we'll cover how to use PowerShell to first authenticate to a MOVEit Transfer server and then we'll cover how to create and monitor a file transfer job using a PowerShell script. … [Read more...]

NSA Adviser Lists The Top Culprits for Nation State Hacking at DEF CON

The former chief of the NSA’s elite Tailored Access Operations Unit told DEF CON attendees who the top culprits for Nation State attacks are, and the results won’t surprise you at all. Except that he left the US off the list… … [Read more...]