Select Page
Everything you need to know about Windows Server 2019 – Part 3

Everything you need to know about Windows Server 2019 – Part 3

This blog post was authored by Dean Wells, Principal Program Manager, Windows Server. In the preceding blogs, you were given a video-tour of some of the high-level advancements made in Windows Server 2019 that touched on areas such as the ... continue reading
SSMS 17.9 is now available

SSMS 17.9 is now available

We are excited to announce the release of SQL Server Management Studio (SSMS) 17.9! Download SSMS 17.9 and review the Release Notes to get started. SSMS 17.9 provides support for almost all feature areas on SQL Server 2008 through the ... continue reading

Top 10 Networking Features in Windows Server 2019: #4 Security with SDN

Share On: Twitter      Share on: LinkedIn This blog is part of a series for the Top 10 Networking Features in Windows Server 2019! -- Click HERE to see the other blogs in this series. Look for the Try ... continue reading

Breaking Into Windows Server 2019: A Faster, Safer Internet

Happy Thursday all! Brandon Wilson back again to introduce you to yet another new post in the blog series by the Windows Core Networking team on the Top 10 networking features in Windows Server 2019. Here is a light overview ... continue reading
Top 10 Networking Features in Windows Server 2019: #8 A Faster, Safer Internet

Top 10 Networking Features in Windows Server 2019: #8 A Faster, Safer Internet

Authors: Gabriel Montenegro, Daniel Havey Share On: Twitter  Share On: LinkedIn This blog is part of a series for the Top 10 Networking Features in Windows Server 2019! -- Click HERE to see the other blogs in this series. Look ... continue reading
Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Much of cybercrime today is fueled by underground markets where malware and cybercriminal services are available for purchase. These markets in the deep web commoditize malware operations. Even novice cybercriminals can buy malware toolkits and other services they might need ... continue reading

Securing your data with Azure SQL Database

The General Data Protection Regulation (GDPR) is now in effect as of May 25th, 2018. GDPR has significant implications on the use and management of your customers personal data. Considerations of privacy, security, data management, and marketing practices are all ... continue reading
#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM

#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM

Azure Security Center Standard includes: Hybrid security – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security ... continue reading
Virtualization-based security (VBS) memory enclaves: Data protection through isolation

Virtualization-based security (VBS) memory enclaves: Data protection through isolation

The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote ... continue reading
Are My RDP Connections Really Secured by a Certificate?

Are My RDP Connections Really Secured by a Certificate?

Hello everyone! Tim Beasley – Platforms PFE coming at you live from the funky fresh jam known as LAS VEGAS! That’s right people! I’m having a blast by the pool at the MGM Grand and loving life!! …writing a blog ... continue reading