Select Page
Driving data security is a shared responsibility, here’s how you can protect yourself

Driving data security is a shared responsibility, here’s how you can protect yourself

You’re driving a long, dark road on a rainy night. If you’re driving 20 miles over the speed limit and you don’t step on the brakes when the car in front of you comes to a sudden stop, is it ... continue reading
Machine learning vs. social engineering

Machine learning vs. social engineering

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few ... continue reading
Virtualization-based security (VBS) memory enclaves: Data protection through isolation

Virtualization-based security (VBS) memory enclaves: Data protection through isolation

The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote ... continue reading
Introducing the NetAdapter Driver model for the next generation of networks and applications

Introducing the NetAdapter Driver model for the next generation of networks and applications

As we move towards a fully connected world, inundated with intelligent devices and massively distributed computing infrastructure, networks that can sustain high bandwidth have never been more relevant. Initial requirements for a 5G network project peak data rates in the ... continue reading
Network start-up and performance improvements in Windows 10 April 2018 Update and Windows Server, version 1803

Network start-up and performance improvements in Windows 10 April 2018 Update and Windows Server, version 1803

Increased container density, faster network endpoint creation time, improvements to NAT network throughput, DNS fixes for Kubernetes, and improved developer features A lot of enthusiasm and excitement surrounds the highly anticipated quality improvements to the container ecosystem on Windows; all ... continue reading

Azure SQL Database – the database engine that cannot die

Azure SQL Database is highly available database Platform as a Service that guarantees that your database will be up and running 99.99% of time, without worrying about maintenance and downtimes. This is a fully managed SQL Server Database Engine process ... continue reading
Windows Defender System Guard runtime attestation architecture

Introducing Windows Defender System Guard runtime attestation

At Microsoft, we want users to be in control of their devices, including knowing the security health of these devices. If important security features should fail, users should be aware. Windows Defender System Guard runtime attestation, a new Windows platform ... continue reading

Connect to Virtual Machines (VMs) on PAW

Continuing the PAW series, this blog post discusses the options to connect to the VMs running on the PAW device. In Windows, you can connect to a locally running VM using: VMConnect (basic mode or enhanced mode) RDP using mstsc.exe ... continue reading
Invisible resource thieves: The increasing threat of cryptocurrency miners

Invisible resource thieves: The increasing threat of cryptocurrency miners

The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks. Cybercriminals gave cryptocurrencies ... continue reading
Loading...