After a cyberattack, restoring identity systems to a trustworthy state can be one of the hardest parts of recovery. In this webinar, veteran technology reporter John K. Waters talks with Senior ...
Email remains the #1 attack vector for cybercriminals, and threat emails are making it through to users' inboxes at an alarming rate. Whether you're relying on a legacy secure email gateway (SEG), ...
Join us to discover where IAM platforms fall short in enforcing consistent access controls and how risk builds through roles, permissions, and integrations. Learn why identity programs struggle with ...
In this session, we’ll go beyond backup to explore what it really means to own and protect your data across Microsoft 365, Entra ID and Azure. You’ll learn how key decisions, including where data is ...
Using Windows Management Instrumentation makes it easy to pull information about the drives on your system or remote systems. Here's how. Managing drives is a very common thing that a system ...
In MCP Magazine's eighth annual salary survey, we evaluate the current state of compensation and provide our outlook for the future of Microsoft certified professionals across the U.S. WE'RE ...
There are some amazing Graphical User Interfaces (GUIs) that exist out in in the community that do a wide variety of things. The problem with these that beginners run into are the complexity that is ...
APIs seem to be everywhere these days. Every popular online service has one. APIs allow developers to interact with online services without actually having to point and click their way through a UI.
Unfortunately, IT professionals have to deal with sensitive information all the time. That information could be in the form of passwords, proprietary company information or anything that you'd rather ...
Stub zones can beef up your DNS infrastructure. Here’s a practical guide to when and how to use them. In a previous DNS column, I briefly covered a new feature in Windows 2003 called stub zones. A ...
Hackers can use tools like BloodHound to visualize the shortest path to owning your domain. But that doesn't mean you can't use it to find and protect your organization's weak spots. Here's how.
Native support for Secure Copy Protocol (SCP) isn't in PowerShell, but that doesn't mean it's not capable. By using a free community module called Posh-SSH, we can transfer files via SCP just as ...