Articles by John
In this post, we review seven of the best USB lockdown software tools to help sysadmin balance security and productivity in their environment.
By John Cirelly
in Net Admin
on May 31, 2024
In this article, we’ll explore the best USB port locking tools you can use to secure your ports without sacrificing productivity.
By John Cirelly
in Net Admin
on December 16, 2024
Learn what bare metal restoration is and explore a few different recovery techniques
By John Cirelly
in Net Admin
on February 24, 2025
In this post, we review what features make for a great BDR solution and explore some of the best BDR software solutions on the market.
By John Cirelly
in Net Admin
on February 24, 2025
BadUSB disguises itself as a human interface device and covertly executes malicious commands or opens virus payloads on the target computer. Learn how you can prevent them.
By John Cirelly
in Information Security
on June 24, 2025
In the article, we review what to look for in an endpoint management system and explore the best endpoint management software available today.
By John Cirelly
in Net Admin
on February 3, 2025
Unsecured repositories can leave you exposed to hackers. In this article, we'll explore the steps you can take to improve your GitHub security.
By John Cirelly
in Net Admin
on December 17, 2024
Looking for the best SOAR tools? Look no further. We put the top SOAR tools to the test and found the ones that rose above the rest.
By John Cirelly
in Net Admin
on February 10, 2025
Security and policy go hand in hand, why not manage them at the same time? Check out our top picks for best network security policy management tools.
By John Cirelly
in Net Admin
on June 20, 2024