“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber,…
Active Directory, commonly known as AD, can be considered the heart of the IT infrastructure. It holds user account information, computers and servers, provides authentication and certificates. It even has…
Welcome back. Last time we met, I reiterated the importance of a good SQL Server monitoring solution, and not just monitoring, but monitoring intelligently. We also went over ways to…
Email is the lifeline for almost every business in this world. When email is down businesses cannot communicate. There is loss of productivity, which could lead to dollars lost, which…
As IT professionals, our main mission is to keep applications running successfully. Each application is judged by end-users, using different factors. Exchange is considered successful by users as long as…
As IT professionals, we have all been there, the dreaded help desk call “Is email down?” (Replace with any business critical application). One of the worst things we deal with…
January 28 is Data Privacy Day (DPD). Observed since 2008, DPD brings awareness to the importance of data privacy and protection. According to the Verizon 2015 Data Breach Investigations Report,…
“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider…
If there’s a chance to save time by using scripts or automation tools, I always take it. Over the years I’ve found that there are a set of common themes…
Contemporary monitoring solutions are no different from any other distributed application in your environment. Even a small-scale deployment can include multiple components: often, these include a Web server, an application server, and…