Select Page
A woman sitting at a table using a laptop

Azure Data Studio 1.41 release

We are less than one month into 2023 and already have a new release of Azure Data Studio to shareintroducing 1.41! With this release, we migrated to a new authentication library, made improvements based on user requests and feedback, and ... continue reading
What's New in Azure Networking – January 2023 edition

What’s New in Azure Networking – January 2023 edition

Hello Folks, As @Michael mentioned last month Azure Networking is the foundation of your infrastructure in Azure. So, we’re happy to bring you a monthly update on What’s new in Azure Networking. In this blog post, we’ll cover what new with Azure ... continue reading

PowerShell/OpenSSH Team Investments for 2023

For , the team had set out lots of objectives and I’m happy to say we accomplished most of them! This year, we’re continuing on improving quality and also adding new features across our portfolio based on feedback from the ... continue reading
Azure Stack HCI: What's new for Software Defined Networking (SDN) with WAC v2211

Azure Stack HCI: What’s new for Software Defined Networking (SDN) with WAC v2211

A warm 2023 “Hello” to our Customers and Partners! Today is an exciting day as we share with each of you the extensive new features and improvements for SDN in Windows Admin Center 2211 (WAC)!  We cannot thank you enough ... continue reading
Microsoft-logo-flag only.JPG

Check This Out! (CTO!) Guide (December 2022)

  Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are ... continue reading
Screenshot of malware code, a script that is used to download a remote code administration tool

Microsoft research uncovers new Zerobot capabilities

Botnet malware operations are a constantly evolving threat to devices and networks. Threat actors target Internet of Things (IoT) devices for recruitment into malicious operations as IoT devices’ configurations often leave them exposed, and the number of internet-connected devices continue ... continue reading
Graphical user interface; text

Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability

On July 27, 2022, Microsoft discovered a vulnerability in macOS that can allow attackers to bypass application execution restrictions imposed by Apple’s Gatekeeper security mechanism, designed to ensure only trusted apps run on Mac devices. We developed a proof-of-concept exploit ... continue reading
New Admin Center Unifies Azure AD with Other Identity and Access Products

New Admin Center Unifies Azure AD with Other Identity and Access Products

Microsoft’s vision for identity goes beyond traditional identity management to give our customers an entire toolset to secure access for everyone and everything in multicloud and multiplatform environments. Earlier this year, we significantly advanced this vision with the launch of ... continue reading
Global distribution map displaying exposed Boa web servers over the span of a week.

Vulnerable SDK components lead to supply chain risks in IoT and OT environments

Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure networks and devices. External tools and products that are managed by vendors and developers can pose a security risk, especially ... continue reading
Bar chart showing the number of DDoS attacks and duration distribution from March 2021-May 2022.

2022 holiday DDoS protection guide

The holiday season is an exciting time for many people as they get to relax, connect with friends and family, and celebrate traditions. Organizations also have much to rejoice about during the holidays (for example, more sales for retailers and ... continue reading