Risk Assessment: Seven Myths Busted

Concepts that we don’t fully understand are usually surrounded with lots of stereotypes. One of the greatest myths of all time, the concept of the Flat Earth that stands on backs of three elephants, was based entirely on old prejudice, yet a lot of people believed in it. Some myths about risk assessment are equally … Continued

Windows PowerShell Scripting Tutorial for Beginners

Automate it. Now, where’s that script… Warning: PowerShell is addictive. Meet PowerShell Tutorial Windows PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell designed to help IT professionals configure systems and automate administrative tasks. You can find it in every modern Windows OS starting with Windows 2008R2. Learning Windows PowerShell is like … Continued

The Ten Best Free Active Directory Management Tools

Active Directory is a backbone of many IT infrastructures around the world, but budgets for software tools are often tight. To help, we’ve put together a list of the top 10 free Active Directory management tools. We hope that this hand-picked selection of free Active Directory tools will help you perform your most pressing and … Continued

NIST SP 800-171: What the Requirements Are and How to Be Compliant

The deadline for Department of Defense (DoD) contractors to implement the requirements of NIST Special Publication 800-171 was 31 December 2017, according to the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012. Companies that failed to do so are in a tough situation: They risk removal from the approved DoD vendor list, which can lead to … Continued

What is GDPR: 10 Frequently Asked Questions

The General Data Protection Regulation (GDPR) is one of the hottest topics making the rounds right now. The law will come into force in May 2018, significantly improving data protection for individuals in the EU and internationally by introducing new restrictions for companies that process the data of EU residents. Panic has already started because regulators have already … Continued

Top 20 Critical Security Controls for Effective Cyber Defense

With data breaches increasing, more than ever organizations have to ensure that they have all necessary security controls in place to keep their data safe. As a response to growing security threats, the SANS Institute, together with the Center for Internet Security (CIS) and other organizations, developed the 20 Critical Security Controls (CSC) for Effective … Continued