• Jedi IT Security Code: 5 Tenets to Defend against Data Breaches 15 Dec. 2015 George Chetcuti

    Netwrix outlines common principles for IT pros to maintain data integrity and mitigate risks of cyber attacks.

  • Don’t Give the Cyber Criminal A Present This Christmas 14 Dec. 2015 George Chetcuti

    Post submitted by the Scottish Business Resilience Centre, SBRC was set up with the objective of creating a secure Scotland for business to flourish, encompassing everything from cyber security to all aspects of premises and employee safety.

  • Last chance to sign up for the webinar: How to Plan and Complete a Secure Office 365 Migration 9 Dec. 2015 George Chetcuti

    Live Webinar: December 10, 2015 @ 11am or 4pm EST | 8am PST or 1pm PST, US Time There are many pathways to an Office 365 migration, but completing the migration is only part of the solution. While Office 365 offers capabilities for Identity Management, it’s limited in protecting data once it leaves the platform.

  • DH2i Unveils New Sandbox Lab for the Rapid Proof of Concept (POC) Testing of Container Management Software for Microsoft Windows Applications 7 Dec. 2015 George Chetcuti

    New POC Lab Demonstrates How Enterprises Can Go from Standalone to High Availability (HA) Failover Clusters in Just a Few Minutes.

  • Patching: A Primer on Protecting an Organization’s Proprietary Information 3 Dec. 2015 George Chetcuti

    Guest post by Robert Brown, director of services Verismic Software.

Show More