Select Page

Anatomy of a secured MCU

Secure silicon Azure Sphere is an end-to-end solution containing three complementary components that provide a secured IoT platform. They include an Azure Sphere microcontroller unit (MCU), an operating system optimized for IoT scenarios that is managed by Microsoft, and a ... continue reading
Confidential computing using Always Encrypted with secure enclaves in SQL Server 2019 preview

Confidential computing using Always Encrypted with secure enclaves in SQL Server 2019 preview

SQL Server 2019 preview brings encryption technology to a broader set of scenarios by enabling rich confidential computing capabilities with the enhanced Always Encrypted feature, Always Encrypted with secure enclaves. Always Encrypted with secure enclaves allows rich computations on encrypted ... continue reading
Datacenter migration updates from Ignite 2018

Datacenter migration updates from Ignite 2018

Microsoft Ignite 2018 took place in Orlando, Florida few weeks ago. It is an annual Microsoft conference for ITPros with more then 700+ sessions and 100+ announcements. Let's review what announcements are relevant if you are migrating from your datacenter ... continue reading
Top 10 Networking Features in Windows Server 2019: #6 High Performance SDN Gateways

Top 10 Networking Features in Windows Server 2019: #6 High Performance SDN Gateways

[crayon-5f6dff8fdfb49778761658/] Organizations today deploy their applications across multiple clouds including on-premises private clouds, service provider clouds, and public clouds such as Azure. In such scenarios, enabling secure, high-performance connectivity across workloads in different clouds is essential. Windows Server 2019 brings ... continue reading

Retire Those Old Legacy Protocols

Hello Paul Bergson back again, and I wanted to bring up another security topic. There has been a lot of work by enterprises to protect their infrastructure with patching and server hardening, but one area that is often overlooked when ... continue reading

Cipher Suite Breakdown

Hi all, my name is Jason McClure and I’m a Platforms PFE with Microsoft. If you read Demystifying Schannel from Nathan Penn, then you may be asking yourself “What do all those letters and numbers mean?” Often, we deal with ... continue reading
Demystifying Schannel

Demystifying Schannel

Hello all! Nathan Penn here to help with some of those pesky security questions that have lingered for years. Recently I have been fielding several questions on “How do I make sure that I am only using the TLS 1.2 ... continue reading
Microsoft BitLocker Administration and Monitoring (MBAM v2.5) Tips

Microsoft BitLocker Administration and Monitoring (MBAM v2.5) Tips

The goal of this blog is to share some information learned (the hard way) from recent customer engagement. Hopefully these tips will save you time and accelerate future MBAM deployments. MBAM has dependencies on SQL Server, IIS web services and ... continue reading
New ransomware, old techniques: Petya adds worm capabilities

New ransomware, old techniques: Petya adds worm capabilities

(Note: We have published a follow-up blog entry on this ransomware attack. We have new findings from our continued investigation, as well as platform mitigation and protection information: Windows 10 platform resilience against the Petya ransomware attack.) On June 27, ... continue reading
wannacrypt1

WannaCrypt ransomware worm targets out-of-date systems

On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed. While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches ... continue reading