FEATURED EPISODE: How to Quickly Identify Suspicious Network Behavior With Intuitive DashboardsFebruary 18, 2020 Log and event data are a boundless and valuable resource for identifying suspicious network activity and stopping potential breaches. However, analyzing lines and lines of text-based data can make this resource…
UPDATE: The community will go into read-only mode at or around 7:00pm CT. At 12:00am CT, the site will be taken down into maintenance mode for at least 16 hours. I will update you all accordingly. Stay tuned! Service Maintenance Notification Summary: THWACK is migrating platforms from Jive to Khoros (Lithium) on February…
UPDATE: THWACK Migration Update v1.0 Whew! That was a ride. We had a few hiccups along the way but I have to say... for the shear size of this migration, we done did well. We're also fully aware that it doesn't look and feel exactly how it did before. Yes, your cheese was moved. Yes, some things are missing. We tried to…
The holidays are in full swing and while we hope this time of year will only bring good tidings and cheer, sometimes it doesn’t always go our way. Maybe the store sold out of the last item on your special someone’s wish list, or the holiday roast overcooked. Regardless, the best we can do when our holiday plans go awry is…
FEATURED EPISODE: How to Monitor Changes to Windows Server RolesDecember 10, 2019 Your servers perform distinct functions in your environment. If one of those roles is removed or added unexpectedly, chaos could ensue. Learn how to understand the roles your servers are currently performing and know if or when those roles…
2019 is coming to an end, and what a great year it was! This tech year was all about data security, IoT, automation, artificial intelligence and machine learning, connected cloud, and hybrid cloud solutions, among many other advanced technologies. As we reminisce about the good moments from the past year, there’s much…
Our Security product team is looking for some thought leadership inspiration and to learn about your day-to-day thoughts and interactions with cybersecurity! Take this survey by December 31, 2019 and with our thanks, you will also receive 500 THWACK points.
FEATURED EPISODE: How to Monitor Changes to Antivirus ExclusionsDecember 17, 2019 Virus scanning can be a main contributor to poor application performance, but administrators must walk a fine line to achieve a secure, virus-free server environment, and keep servers and applications performing reliably. This balance can be…
FEATURED EPISODE: How to Monitor Changes to Local CertificatesDecember 24, 2019 Local certificates provide a multitude of security benefits. From encrypting emails and allowing easier authentication, to securing connections between web browsers and your web servers, they're a necessary part of any network. Learn how to…
FEATURED EPISODE: How to Harden Servers with PowerShell and Change MonitoringDecember 31, 2019 Server and application configurations are a fundamental piece of securing your environment. If unauthorized changes are made to these configurations, you can be exposed to serious vulnerabilities. Learn how to harden your servers…
It looks like you're new here. Sign in or register to get started.