January 2018 Technology Trends Report

CTOvision

Welcome to this month's Technology Trends report. We produce this report to provide insights you can use regarding the rapidly changing technological landscape. If you would like to change the e-mail address you get this report […]. We want to help you find the best ways to leverage new technologies to accomplish both your personal and professional goals. CTO News

Trends 133

Dell BIOS Reporting Tool

Mick's IT Blog

You will want to run this in SCCM in order to find the systems with the latest BIOS version to generate the report on. Recently, we ran into a problem when we discovered some of the newer laptops were not automatically disabling the WiFi when connected to ethernet.

Dell 203

DDOS Trends Report 2016

CTOvision

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. Download the full report at this link: Download “DDOS Trends Report 2016” Verisign_report-ddos-trends-Q22016.pdf – Downloaded 439 times – 3 MB.

Trends 153

SEC Investment Company Reporting Modernization Program Challenges

Perficient - Digital Transformation

In a new guide, we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. Data Governance: Data dictionary, lineage, and stewardship processes must be established for required data elements used in the new reports, as well as demonstrated to the SEC, if required.

The Startup Ecosystem Report

CTOvision

Compass , the startup data benchmarking company, has just released their second “ Startup Ecosystem Report ”. It has been three years since their prior report. The post The Startup Ecosystem Report appeared first on CTOvision.com.

Report 190

Investment Company Reporting Modernization Goals & Expectations

Perficient - Digital Transformation

In a new guide, we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The SEC wants to improve: The quality of information that funds report to the Commission. Ease of access, aggregation, and analysis of the reported data by the Commission and the public. Form N-CEN: Requires investment companies to report census-type information annually in a structured data format.

SEC Investment Company Reporting Modernization Foundational Work

Perficient - Digital Transformation

In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. By now, you should have a program in place that covers the following work streams: Engage Report Filing Provider: Initiate a project with the selected service provider to collect and process data, and file the required forms.

Trusted Sites Report

Mick's IT Blog

I wrote this PowerShell script that will generate a report listing all trusted sites. It separates those in the report. The report is displayed on the screen with the option to write it to a text file by specifying the FileOutput parameter switch. Recently, we had to add a new trusted site to the trusted sites GPO. As you may know, if the GPO contains a lot of trusted sites, it can be cumbersome to determine if a site is in there.

Report 152

[Guide] SEC Investment Company Reporting Modernization

Perficient - Digital Transformation

In an effort to increase transparency, the Securities and Exchange Commission (SEC) has adopted new rules and amendments, called Investment Company Reporting Modernization Rules , which require registered investment companies to modernize their reporting and disclosures. Our new guide discusses the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions, including: Why the SEC established new rules.

SEC Investment Company Reporting Modernization Deadlines

Perficient - Digital Transformation

In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The snippet below shares some deadlines the new rules present. Form N-PORT. If you are a larger entity with net assets of over $1 billion, you were initially required to comply by June 1, 2018. The SEC has granted a nine-month delay, but you must still gather and maintain all the required data as of June 1, 2018.

MDT Windows Updates Build Report

Mick's IT Blog

I found it nice to be able to get a clean, filtered report on what Windows updates got installed during the build process. The tool has given me a report, but there were times I forgot to look at it after a build completed. This reminds me by sending the report out via email.

Report 209

SCCM Mapped Drives Report

Mick's IT Blog

This script will scan all user profiles on a machine and report users with mapped drives. It has been written so that you can either have the script write the report to a text file if you do not have SCCM and/or it can write it to WMI so that SCCM can read the results.

Report 194

Pending Reboot Reporting with Orchestrator

Mick's IT Blog

It reports systems that are waiting for a reboot to a non-compliance collection. I wanted to take this to the next level with automated reporting via email.

Report 193

Data report posits post-Brexit productivity uplift

Computer Weekly

A report published to coincide with Big Data London 2017 finds UK organisations confident that data skills investment will engender productivity uplift, despite Brexit

Report 136

Malicious email spikes in Q2, reports Proofpoint

Computer Weekly

Malicious email campaigns saw a spike in volume and increased variety in the second quarter of 2017, a cyber security report reveals

Report 150

PowerShell: Generate User Logon Report

Mick's IT Blog

This script will generate a logon report of a specific user on a specific machine. This website helped me considerably in knowing how to generate and classify the reporting. This script is designed to query the event viewer logs on either a local or remote machine.

Report 196

Download eBook on SCOM Reporting

Anoop

SCOM comes with a verity of default reports. SCOM default reports will be available for you when you install a management group. These reports help you to review the operational telemetry and configurations.

eBook 59

Implementing IGMP Membership Reports

IT Toolbox

Because the standard specifies that the report for each host group should be delayed a random time, igmp_settimers calls function hgrand to compute a delay

Report 135

BT reports solid growth despite weak pound

Computer Weekly

The collapse in the value of the pound following the EU referendum has not dented BT’s confidence, with strong growth reported across multiple business units

Report 175

IGMP: Membership Reports

IT Toolbox

Because the standard specifies that the report for each host group should be delayed a random time, igmp_settimers calls function hgrand to compute a delay

Report 126

2018 could be year of critical infrastructure attacks, says report

Computer Weekly

The coming year is likely to see an increase in the number of cyber attacks on critical national infrastructure (CNI), according to a report based on experts’ forecasts

Report 156

MDT Build Reporting Tool

Mick's IT Blog

I have been wishing for a reporting system to which MDT would automatically email IT staff when a build is finished. I used their information and function to expand the process into a full fledged reporting tool.

Tools 200

2017 DBIR Report

IT Toolbox

ve just been reading the 2017 version of the Verizon Data Breach Investigations Report (DBIR

Report 109

Pending Reboot Reporting

Mick's IT Blog

Recently, I implemented Kent Agerlund's technique for monitoring pending reboots located here. This works great, but I also found out there are additional reboot flags on systems that I wanted to monitor. I must say a big thank you to Dean Attali's blog How to Check if a Server Needs a Reboot for providing the information on which registry keys and WMI entries indicate a system is waiting for a reboot. After getting that information, I changed step 5 from Kent's blog with the script below.

Report 155

Cyber attackers upped their game in 2017, warns report

Computer Weekly

Cyber attackers ranging from criminals to nation states have upped their game in the past year, “moving the needle” in terms of tactics, techniques and procedures, a report by a cyber security firm warns

Report 161

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. By Bob Gourley.

Report 195

MSI Analysis Reporting Tool

Mick's IT Blog

Here is a tool I have written that generates a report on all of the variables used for each entry during an MSI installation. It will produce a verbose text file which the script will read from to produce the report. This will then report the variable associated with the folder.

OODAloop nails it again with reporting on Bitcoin price manipulation

CTOvision

These are some of the cybersecurity and cyberwar stories we are tracking: Bitcoin’s Price Was Artificially Inflated Last Year, Researchers Say New York Times is reporting on a topic most readers will have already seen at OODAloop. OODAloop provided some great context on the manipulation of bitcoin prices in: Let’s be Honest…the Price of Bitcoin is [.]. Blockchain and Cryptocurrency CTO Cyber Security Cyber War News

Report 106

PowerShell: Installed Applications Report

Mick's IT Blog

The purpose of this report is so the build team has a concise list of optional applications they need to install during a replacement build for a user. This file contains a list of the applications you do not want to be included in the report. The application in the file need to be exactly how they appear in the report. You can copy and paste the apps from the report to the ExclusionList.txt file.

DDoS attacks consistent, relentless and costly, report shows

Computer Weekly

The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase

Report 192

Webinar Replay: How to simplify self-service reporting

mrc's Cup of Joe Blog

Summary: In many organizations, end user reporting runs through a single department or individual. They must build and customize the reports for end users—many of which want their reports customized in different ways. Does your organization have a reporting bottleneck?

Consumer Reports: Digital Threats and the Cyber Gap

CTOvision

Another prominent research organization, Consumer Reports, has investigated American victims of digital crime and quantified American responses to the growing number of cyber attacks. CTO Cyber Security DoD and IC Research Computer security Consumer Reports EBay

Report 151

Setup Configure SCCM CB Reporting Services Point

Anoop

We can make beautiful reports with the data collected by SCCM. SCCM has near about 500 default of reports those are available out of the box. To get access to these default SCCM reports, you need […]. SCCM has rich capabilities to collect lots of information from endpoints.

Report 105