Five worthy reads: Infrastructure as Code, the single source of truth

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the concept of Infrastructure as Code. From server setup and hardware configuration to application deployment, traditional end-to-end IT infrastructure management has high overhead and takes a lot of time and effort. With the advent of cloud computing, IT infrastructure has evolved to address the availability, scalability, and agility problems organizations face. Yet the issue of inconsistent configurations…

Patch Connect Plus goes one step further with new Application Management and Admin Tools

Microsoft recently celebrated a significant milestone, as System Center Configuration Manager (SCCM) now manages 175 million devices across the globe. This is indeed a great achievement that clearly highlights the reach SCCM has among people managing numerous endpoints. But along with its incredible popularity, there are also certain areas where SCCM falls short, as per the reviews from TrustRadius. Shortcomings of SCCM …

Voucher digitali I4.0 (Misura A e B Anno 2019)

  Chi può beneficiare? con sede legale e/o unità locali nella circoscrizione territoriale della Camera di Commercio di Alessandria; ·essere attive e in regola con l’iscrizione al Registro delle Imprese; essere in regola con il pagamento del diritto annuale; avere il Durc regolare; micro, piccole e medie imprese. Cosa si può finanziare. Formazione aziendale (Formazione…

Microsoft Patch Tuesday September 2019: 79 vulnerabilities fixed

No matter how prepared you are, Patch Tuesday never fails to throw in a surprise. All supported versions of Windows are affected by two privilege escalation vulnerabilities that have already been exploited in the wild, CVE-2019-1214 and CVE-2019-1215. Since they’re privilege escalation vulnerabilities, they allow attackers to launch programs with elevated administrative privileges. Privilege escalation vulnerabilities are commonly used…

Announcing our weekly podcast series—subscribe now and start listening

Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We’re thrilled to announce the launch of our weekly podcast series where our security experts, including Derek Melber, Active Directory MVP, will present their take on a wide range of IT security topics.…

Password sync in hybrid Active Directory

On any given day, employees toggle between multiple business-critical applications, both on-premises and cloud-based, requiring them to remember different passwords. This often leads to password fatigue and, subsequently, a surge in password-related help desk calls. Although IT administrators can manually manage password changes, these requests consume a lot of time and resources that the help desk could be investing elsewhere. Instead, IT admins…

NTLM vulnerabilities that make you susceptible to relay attacks

In June 2019, Microsoft released patches for two critical vulnerabilities that were discovered in it’s NT LAN Manager (NTLM) protocol suite affecting all versions. These vulnerabilities let attackers execute malicious code on any Windows machine remotely, or even authenticate to an HTTP or Exchange server. In a previous blog, we saw how some of the authentication protocols in Active Directory (AD) work and the cybersecurity risks associated…