IT and Business Insights for SMB Solution Providers

Technology

Resource
August 20th, 2021 | Matt Whitlock
Famed business consultant Erick Simpson of ErickSimpson.com takes the reigns as guest co-host alongside Matt while Rich gets a little R&R. - read more
 
Article
August 20th, 2021 | James E. Gaskin
Demand for mining hardware, both GPUs and AISCs, is high, but builders face supply limitations. - read more
 
Blog Entry
August 18th, 2021 | Jay Ferron
How to Gain More from your Connection to an OT Network - read more
 
Blog Entry
August 18th, 2021 | Jay Ferron
As we know, each organization is unique and have different use cases and scenarios in mind when it come to security operations. Nevertheless we've identified several use cases that are common across many SOC teams. Azure Sentinel now provides built-in watchlist templates, which you can customize for your environment and use during investigations. - read more
 
Blog Entry
August 18th, 2021 | Jay Ferron
In collaboration with the Microsoft Threat Intelligence Center (MSTIC), we are excited to announce Fusion detection for ransomware is now publicly available!   - read more
 
Blog Entry
August 18th, 2021 | Jay Ferron
 Recent reports show the high extent to which information workers are utilizing cloud apps while doing their everyday tasks. In an average enterprise, there are more than 1500 different cloud services used, where less than 12% of them are sanctioned or managed by the IT teams. - read more
 
Blog Entry
August 18th, 2021 | Jay Ferron
 With the massive volume of emails sent each day, coupled with the many methods that attackers use to blend in, identifying the unusual and malicious is more challenging than ever. - read more
 
Blog Entry
August 5th, 2021 | Jay Ferron
Control assessments are not about checklists, simple pass/fail results, or generating paperwork to pass inspections or audits. The testing and evaluation of controls in a system or organization to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome are critical to managing and measuring risk. - read more
 
Blog Entry
August 5th, 2021 | Jay Ferron
 Cyber attacks are a reality. Sometimes even with the best protective measures in place, adversaries can breach perimeter defenses and find their way into systems. - read more
 

Pages

Subscribe to Technology