How-Tos

cssg 026 thumb
video

How to move users to the Outlook app with Intune

Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.

nwht 038 thumb
video

How to use the ac command: 2-Minute Linux Tips

Learn how to use the ac command. It reports on user login times, so if you’re interested in knowing how much time various users are spending on a Linux server, this command is a good choice.

cssg 025 thumb
video

How to monitor Windows to prevent credential theft attacks

Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it.

nwht 037 thumb
video

How to use the sudo command: 2-Minute Linux Tips

Learn how to use the sudo command. It’s a very important command for Linux security because it provides a way for individual users to run specific commands with the authority of root.

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

nwht 036 env
video

How to use the env command: 2-Minute Linux Tips

Learn how to use the env command. The most useful thing it does is to provide information on your shell environment when you’re working on the Linux command line.

cssg 023 thumb
video

How to disable basic or legacy authentication to set up MFA in Office 365

Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.

ifcr 033 thumb
video

How to get API data with R

No R package for an API you’d like to use? No problem! See how to write your own R code to pull data from an API using API key authentication.

nwht 035 thumb
video

How to use the touch command: 2-Minute Linux Tips

In this Linux tip, learn how to use the touch command. It allows you to create an empty file or update a file’s last updated date/time settings.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

nwht 034 thumb
video

How to use the wc command: 2-Minute Linux Tips

Learn the wc command. It provides an easy way to count the lines, words and characters in a file or in output from some other command.

youtube thumbnails template
video

R tip: How to use Git and GitHub with R projects

See how to use Git version control and sync with GitHub -- all right within RStudio

nwht 033 groups
video

How to use the groups command: 2-Minute Linux Tips

Learn how to use the groups command. It provides a list of the groups that a user is a member of by pulling information from the /etc/group and /etc/passwd files.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

cssg 021 thumb
video

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

cssg 020 thumbpng
video

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you...

Targeting user behavior.

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior.

ifcr 031 thumb
video

How to make your own ggplot2 functions

See how easy it is to make your own functions using ggplot2, dplyr, and other tidyverse package functions – without worrying about quoted and unquoted column names! Thanks to the latest version of the rlang package, tidy evaluation is...

cssg 019 thumb
video

How to set up Azure AD to spot risky users

You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.

ifcr 030 thumb
video

How to use .SD in the data.table package

See how to use the special .SD symbol in the R data.table package.

Load More