In today’s world, data and protecting that data are critical considerations for businesses...
Author - Stephen Watts
An Introduction to Security Debt
A subset of technical debt, security debt is essentially the vulnerabilities and flaws in your...
What is Security Information and Event Management (SIEM)?
In the myriad of IT systems designed to protect an enterprise’s sensitive data, it’s the Security...
Security Automation: A Beginner’s Guide
Security automation refers to machine-actions that monitor, detect, troubleshoot and remediate...
Runbook Automation (RBA): An Introduction
IT systems are inherently complex beasts thanks to the very nature of modern technology which is a...
Workload Automation (WLA) vs Robotic Process Automation (RPA):...
Workload automation (WLA) and robotic process automation (RPA) are both tools that help businesses...
What is Security As Code?
Businesses have quickly and sophisticatedly embraced cloud technology to super-serve customers and...
A Primer on Service Level Indicator (SLI) Metrics
Keeping track of customer satisfaction is crucial for any company aiming to provide exceptional...
How to Write an SOP (Standard Operating Procedure)
I often help customers automate their business processes with Server Automation. I start by...
Introduction to Service Request Catalogs
Before discussing Service Request Catalogs, let’s make sure we’re on the same page. As it turns...