Our Latest News

CISA Adds Twelve Known Exploited Vulnerabilities to Catalog 

CISA has added twelve new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal...

Empower self-service by adding knowledge base search to your bots

Empower self-service by adding knowledge base search to your bots

Customers appreciate the quick access to help that self-service bots provide. They want to be empowered to research and solve issues on their own, which increases their brand loyalty. Knowledge management integration in Microsoft Power Virtual Agents enables customers...

#WeAreMEC: IN CASE YOU MISSED IT… MEC is back September 13-14!

It’s been a while since our last MEC, and a lot has changed since then. The MEC Technical Airlift is a free, digital event for IT professionals who work with Exchange Online and/or Exchange Server day-to-day, and ISVs and developers who make solutions that integrate...

CISA Releases Five Industrial Control Systems Advisories

CISA Releases Five Industrial Control Systems Advisories

Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure...

Digital event: Empowering Your Workforce in Economic Uncertainty

Digital event: Empowering Your Workforce in Economic Uncertainty

Join us for new insights on the employee experience Faced with a shifting economic landscape and increasingly tight labor market, today’s leaders are looking for new ways to balance organizational success with the wellbeing of their teams.   Join Satya Nadella...

#StopRansomware: Vice Society

CISA, the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint Cybersecurity Advisory (CSA), #StopRansomware: Vice Society, to disseminate tactics, techniques, and procedures (TTPs) and...

Meet Microsoft Teams Rooms Pro

Meet Microsoft Teams Rooms Pro

Now more than ever organizations need a single, integrated experience that makes working together easier and more engaging for their employees whether they are all in the same room, remote, or—for many of us—a mix of both. Because of this, Microsoft is happy to...

Vulnerability Summary for the Week of August 29, 2022

advancecomp -- advancecomp Advancecomp v2.3 was discovered to contain a segmentation fault. 2022-08-29 not yet calculated CVE-2022-35019MISCMISC advancecomp -- advancecomp Advancecomp v2.3 was discovered to contain a segmentation fault. 2022-08-29 not yet calculated...

#StopRansomware: Vice Society

Summary Actions to take today to mitigate cyber threats from ransomware:• Prioritize and remediate known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce multifactor authentication. Note: This joint...

Improved For-each loop performance in Stateless Workflows

Improved For-each loop performance in Stateless Workflows

Introduction For-each loop is a common construct in many languages, allowing collections of items to be processed the same way. Within Logic Apps, for-each loops offer a way to process each item of a collection in parallel – using a fan-out / fan-in approach that, in...

Recent Comments

    Dr Ware Technology Services

    We look forward to meeting you

    Phone Number: 843 573 0970
    Toll Free: 83DRWARE83 or (833) 792-7383

    Contact Us