IT automation is an important feature of any successful business, especially one that’s...
Author - Stephen Watts
Hybrid Digital Infrastructure Management (HDIM): An Introduction
One of the newest tech buzzwords that emerged during the last few years is Hybrid Digital...
A Primer on Endpoint Detection & Response (EDR)
Although computer system security has been around for decades, endpoint detection and response...
What Is Security Orchestration, Automation, and Response (SOAR)?
A relatively new platform for data security is Security Orchestration, Automation, and...
What is Sprint Zero? Sprint Zero Explained
The benefits of applying Agile are clear and far-reaching. These include: Improved product quality...
Java Developer Roles & Responsibilities
What does a Java developer do? A Java Developer is responsible for the design, development, and...
DevOps Engineer Roles & Responsibilities
DevOps isn’t magic, but it can look like it from the outside. In today’s job market, workers in...
An Introduction to Security Debt
A subset of technical debt, security debt is essentially the vulnerabilities and flaws in your...
Security Automation: A Beginner’s Guide
Security automation refers to machine-actions that monitor, detect, troubleshoot and remediate...
Runbook Automation (RBA): An Introduction
IT systems are inherently complex beasts thanks to the very nature of modern technology which is a...