See the original publication found in On Balance...
Security Operations
I have M365 for our Enterprise email… OMG how to deal with the outages?
Another M365 email outage... seriously just...
Time to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface Management
Warning: This blog contains purposeful marketing...
Empowering Your Project Manager: The Benefits of an IT Focused Approach to Logistics
One of the things I have noticed while working...
The Benefits of a Partnership Built on Trust
Why Trust is Essential Our valuable experience...
We’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priority
The COVID-19 event, obviously, has had a...
Continuous Penetration Testing
“So, let’s say we fix all of the...
People are People, but Where Can You Find Them When You Need Them?
Trying to find qualified IT infrastructure and...
Remote Access Rush
Practicing good remote access hygiene in times...
Are we prepared?
Risks and Considerations for IT: A Pandemic What...
Why Microsoft Office 365 Secure Score Isn’t Enough
Microsoft Secure Score. If you’re an IT...
Characteristics of a Relevant Information Security Program: Communications
The Challenge You budget for, enable, and staff...
DA 101 – Protecting your Domain Admin Account
At SynerComm's Fall IT Summit 2018 we presented...
Thoughts on Blocking Powershell.exe
This post is inspired by a twitter debate I...
Intro To Active Directory Delegation
One of the most frequent questions I get from my...
Qualys Scanner API In Powershell Including External Ticket Creation
So you would like to automate your vulnerability...
Validating the Effectiveness of Your Controls
About six years ago, social engineering...