logo
Nick Cavalancia is a technical evangelist and founder of IT consulting firm Techvangelism. Nick has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist. He has authored, co-authored and contributed to over a dozen books on Windows, Active Directory, Exchange and other Microsoft technologies and has spoken at many technical conferences on a wide variety of topics. Previously, Nick has held executive marketing positions at ScriptLogic (acquired by Quest, now DELL Software), SpectorSoft and Netwrix where he was responsible for the global messaging, branding, lead generation and demand generation strategies to market technology solutions to an IT-centric customer base.
System Administration
September 17, 2014

Exchange Server Down: You Only Have Minutes

You just got the call: your Exchange server is not sending or receiving email. Your one and only Exchange server. OK, this is bad. You drop everything and begin to check the Exchange server for...
Compliance
August 21, 2014

Peeling the Onion: How to Survive an IT Audit

We continue the series of articles by Nick Cavalancia on our blog. The previous post was dedicated to Event Logging, today we are going to talk about general approach to IT Audit. An IT Audit is,...
Infrastructure
August 15, 2014

Can You Make Sense of Your Security Logs?

The average IT Pro doesn't need to be told stories about big data - you've been inundated with log data from dozens of sources for at least a decade before the term "big data" even came to exist. The...
Infrastructure
December 5, 2013

Can the NSA Spot the "Adversary"?

The NSA released a PDF entitled "Spotting the Adversary with Windows Event Log Monitoring" earlier this year. While there's a bit of irony in this, given the whole Snowden story that followed the...
Identity
November 11, 2013

Best Practices for Change Management in the Data Center

When it comes to change management, Scott Matteson gets it.  Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of...
Identity
November 7, 2013

Death by Event Log Overload

When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can...