How to Use WhatsUp Gold to Set Up Automated ServiceNow Ticketing

How to Use WhatsUp Gold to Set Up Automated ServiceNow Ticketing

Wouldn’t it be great if you could get an automatic alert every time something in your house or car broke, like when a spark plug or fuse failed, or when a light bulb went out? That way you could fix those problems before they caused you any trouble… If only. For most of us, the […]

The Real Reason We Need Multiple Data Backups

The Real Reason We Need Multiple Data Backups

In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That’s why multiple data backups are necessary. Ignoring the complexities involved in protecting our data from internal and external attacks, let’s look at the problems associated with successfully storing data (whether structured […]

What is a Port Scanner?

What is a Port Scanner?

Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors: Cyber attackers breached more […]

Monitoring Your Azure Resource Usage with WhatsUp Gold

Monitoring Your Azure Resource Usage with WhatsUp Gold

In 2019, cloud computing hasn’t just hit the mainstream, it is the mainstream. In fact, some experts are predicting that upwards of 80% of enterprise workloads will live in the cloud by 2020. By-and-large, this rise in cloud adoption has been driven by Amazon Web Services or AWS, as it’s commonly called. And while Amazon […]

The Importance of Continuous Delivery in DevOps

The Importance of Continuous Delivery in DevOps

DevOps as a practice and philosophy includes the communication and teamwork between developers and IT operations. Traditionally, developers and operations are two very different teams who would point fingers when issues would arise with software. DevOps is an attempt to abolish this and has both teams work together. The business result of this is a […]

Raspberry Pi Used to Steal 500MB of Data From NASA

Raspberry Pi Used to Steal 500MB of Data From NASA

Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for […]

How to Easily Search Windows Event Logs Across Hundreds of Servers with PowerShell

How to Easily Search Windows Event Logs Across Hundreds of Servers with PowerShell

When troubleshooting problems or investigating potential security breaches, the Windows event log is a great place to start. Windows provides an extensive list of various event logs grouped by a provider with a sometimes staggering number of events recorded within. With all of these events being recorded, it’s hard to figure out what’s going on. […]

Using PowerShell to Search and Troubleshoot Windows Event Logs

Using PowerShell to Search and Troubleshoot Windows Event Logs

Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what […]