Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Managing SharePoint Online and Exchange Online with PowerShell

Managing SharePoint Online and Exchange Online can be a painful task — you have to constantly switch between multiple administration centers and it’s hard to know where to go for a specific setting. Luckily, you can accomplish many tasks with PowerShell. Learning a few basic commands and scripts will make your life so much easier. In this webinar, Liam Cleary and Jeff Melnick will walk you through how to use PowerShell to.

Change Is Inevitable: Tripwire File Analyzer

One of the only things that is constant in life is change. It’s the same with cybersecurity. There are different types of changes to consider. A lot of changes in our everyday life are out of our control. It can be hard to discover, monitor and even react to change. However, when it comes to change in the world of cybersecurity, it’s possible we can manage that change in a way that can have a positive impact on our business.

Endpoint security: The key to protecting your enterprise

To operate efficiently, businesses today use numerous devices such as laptops, desktop computers, and mobile devices. Securing all these devices—collectively called endpoints—significantly improves the overall security of your enterprise’s IT network. This blog can help you get started with endpoint security. To begin with, let’s define endpoint security.

Securing your SaaS apps in 2020: 3 pillars you can't neglect

In 2010, cloud computing just started to lead the IT revolution. It’s 2020 and the cloud is already mainstream. If you’re not running your business in virtual yet, you’re missing out on huge profit opportunities and capabilities that the cloud has to offer. Adopting a cloud strategy brings better security, increased stability and overall greater flexibility for your organization.

The NHS has suffered only six ransomware attacks since the WannaCry worm, investigation reveals

An investigation claims that the UK’s National Health Service, which was hit hard by the notorious WannaCry worm in 2017, has seen a marked fall in ransomware attacks since. A report published by Comparitech, based upon Freedom of Information requests, reveals the somewhat surprising news that since WannaCry there have only been six recorded ransomware attacks against the NHS.

Building a Circuit Breaker in Node.js (Part 1)

Circuit breakers were originally designed to protect electrical circuits from damage. Software development has adopted the concept as a type of resiliency pattern and it can now be found commonly in the cloud-native and microservices stacks. They can also be valuable in any codebase that needs to offer more flexibility, especially when relying on third-party APIs. Welcome to Part 1 of this two part series on building a circuit breaker in Node.js.