Blog

By Kamran Ahmad, Posted in Infrastructure, Support, Virtualization

Recently, I was upgrading a customer's StoreFront deployment from version 1912 to version 2402 LTSR CU1 on a Windows Server 2019. During the process, I encountered an issue where I could not uninstall StoreFront on the second server in the StoreFront server group. The following error message was displayed: I tried the steps in this Citrix article, which had a similar error message, but that did not work. After some digging, I realized Citrix services were still present. I followed the steps below to r... read more.

  • January 03, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/16 8 Trends Reshaping Network Security in 2025 (Palo Alto Networks) The future of network security is an exciting one, but it also comes with its challenges. As 2025 approaches, it’s critical for organizations to stay ahead of these emerging trends by building agile security strategies that are adaptable to the rapidly changing threat landscape. https://www.paloaltonetworks.com/blog/2024/12/8-trends-network-security-in-2025/ How integrated, intelligent identity security makes you more pr... read more.

  • December 20, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the world of cybersecurity, staying ahead of threats requires more than just vigilance; it demands a keen eye for detail and an ability to uncover hidden assets. This is where CIS Safeguard 1.3, "Utilize an Active Discovery Tool," comes into play, much like the legendary detective Sherlock Holmes. The Case of the Missing Assets Imagine Sherlock Holmes, with his magnifying glass in hand, meticulously sca... read more.

  • December 17, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/9 Windows 365 Link: A New Era for Thin Client Computing Unveiled at Ignite 2024 Microsoft unveiled the Windows 365 Link at its Ignite conference on November 19, 2024. This compact, fanless device is designed to provide seamless access to Windows 365 Cloud PCs, building upon the legacy of Windows CE, Microsoft's early thin client operating system. https://www.gothamtg.com/blog/windows-365-link-a-new-era-for-thin-client-computing-unveiled-at-ignite-2024 How to Overcome MFA Challenges for Stronge... read more.

  • December 13, 2024

By Steve Gold, Posted in Security

Well, that’s a wrap! Bryon Singh and I published a blog on all 56 cyber defense safeguards from CIS Critical Security Controls Implementation Group 1. These 56 safeguards are considered “essential cyber hygiene” for every organization. CIS recommends these safeguards as what every enterprise should apply to defend against the most common attacks. Transitioning from CIS Controls IG1 to IG2 Building a strong foundation with CIS Controls Implementation Group 1 (IG1) is just the beginning of... read more.

  • December 10, 2024

By Timothy Karl, Posted in Infrastructure, Virtualization

Microsoft unveiled the Windows 365 Link at its Ignite conference on November 19, 2024. This compact, fanless device is designed to provide seamless access to Windows 365 Cloud PCs, building upon the legacy of Windows CE, Microsoft's early thin client operating system. Key Benefits of Windows 365 Link: Accelerated Application Updates: With a Windows-based thin client, updates for applications like Microsoft Teams are managed centrally, ensuring users receive new features and improvements more rapidly tha... read more.

  • December 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/2 Why Data Infrastructure Is the Bedrock of AI’s Success (Pure Storage) AI can be a resource-intensive and power-hungry endeavor. A high-performance storage platform that offers seamless data accessibility, scalability, and energy and cost efficiency will be essential to meet the demands of AI today and into the future. https://blog.purestorage.com/perspectives/why-data-infrastructure-is-the-bedrock-of-ais-success/ What is bring your own device (BYOD)? (Nerdio) As remote and hybrid work... read more.

  • December 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/11 October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors (Check Point) Check Point’s Global Threat Index for October 2024 reveals a concerning trend in the cyber security landscape: the rise of infostealers and the increasing sophistication of attack methods employed by cyber criminals. https://blog.checkpoint.com/security/october-2024s-most-wanted-malware-infostealers-surge-as-cyber-criminals-leverage-innovative-attack-vectors/... read more.

  • November 15, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 How to Enroll an iOS 18 Device in Intune Older versions of iOS continue to support the older enrollment method and the device can be successfully upgraded to iOS 18. However, if the user unenrolls the device, re-enrollment will need to be done with the newer enrollment method. https://www.gothamtg.com/blog/ios-18-mobile-device-management-enrollment Why SIEM Is Not Right for SaaS Security (Arctic Wolf) Automating data collection, aggregation, and analysis from all the security tools sounds l... read more.

  • November 08, 2024

By Ed Bratter, Posted in Infrastructure, Support

Many look forward to the Fall when Apple releases its newest version of iOS with the new features and toys it presents. One of this year’s improvements offers a vastly simplified process for enrolling personal (BYOD) devices into a mobile device management (MDM) solution such as Intune. The current method requires installing both the Company Portal and the Microsoft Authenticator app, and requires a dance through a maze of screens and jumping between applications to successfully enroll a dev... read more.

  • November 04, 2024
1 : 00 AM

Hour
Minutes
AM PM
1 2 3 4 5 6 7 8 9 10 11 12