Select Page

Credential Theft: How the Attack Landscape has changed and What You can do about it

The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access ... continue reading
The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity. Join Lex Thomas as he welcomes Jeremy Rule to the show, as they ... continue reading

How to Navigate through the new Windows Update Model

Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of ... continue reading
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft's Latest Cybersecurity Solution

Enterprise Threat Detection Service: An In-Depth Overview of Microsoft’s Latest Cybersecurity Solution

Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei ... continue reading
thCA1QREO3

Windows Server 2016: (Part 1) Getting Started with Shielded VMs

One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new ... continue reading

Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, ... continue reading
thCA1QREO3

How to Simplify Device & Apps Management using Microsoft Intune

Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s ... continue reading
thCA1QREO3

Getting Started with Windows Containers

Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why ... continue reading
thCA1QREO3

Windows Server 2016: Credential Theft Mitigation Features

Lex Thomas welcomes back Brantley Whitley to the show as they discuss the new Credential Theft Mitigation Features found in Windows Server 2016. Learn how you can use the new Active Directory Domain Services features to improve your organization’s ability ... continue reading
thCA1QREO3

How to Leverage the Azure Security Center & Microsoft Operations Management Suite for an Incident Response

Join Lex Thomas and Yuri Diogenes as they discuss how you can leverage both the Azure Security Center and Microsoft Operations Management Suite (OMS) to better manage cybersecurity threats in both the cloud and hybrid cloud environments.[2:10] Why are some ... continue reading