Select Page
Diagram showing X64 stage 1 address translation from virtual address to guest physical address

Introducing Kernel Data Protection, a new platform security technology for preventing data corruption

Attackers, confronted by security technologies that prevent memory corruption, like Code Integrity (CI) and Control Flow Guard (CFG), are expectedly shifting their techniques towards data corruption. Attackers use data corruption techniques to target system security policy, escalate privileges, tamper with ... continue reading

Expanding SQL Server Big Data Clusters capabilities, now on Red Hat OpenShift

SQL Server Big Data Clusters (BDC) is a new capability brought to market as part of the SQL Server 2019 release. BDC extends SQL Server's analytical capabilities beyond in-database processing of transactional and analytical workloads by uniting the SQL engine ... continue reading
Windows Admin Center Container Extensions

Az Update: AMD Nested Virtualization, WAC Container Extension, Policy for Cosmos DB, and more!

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading

Microsoft raises the security standard for next major Windows Server release

Server security and platform Integrity are critical requirements in today's datacenter, edge, and cloud environments. Many Windows Server customers have relied on built-in security capabilities such as Secure boot and BitLocker to protect their infrastructure. These capabilities are enhanced when ... continue reading
AMD Nested Support showing a VM running on a VM on AMD Hardware

AMD Nested Virtualization Support

AMD Nested Support showing a VM running on a VM on AMD Hardware Nested Virtualization is not a new idea. In fact, we announced our first preview of Nested Virtualization running on Windows way back in 2015. From that Windows ... continue reading

VMware Workstation and Hyper-V

As a follow up to our previous post on VMware and Hyper-V Working Together, VMware has released a version of VMware Workstation that works with the Windows Hypervisor Platform (WHP). This release adds support for VMware Workstation running side by ... continue reading

Open innovation, customer choice, and reliability with SQL Server on SUSE

With nearly two decades of delivering joint innovation to meet changing business demands, Microsoft and SUSE continue to focus on enabling digital transformation for our customers, building on open source solutions, and a seamless collaborative support model for SUSE workloads ... continue reading
Networking stack in traditional scenarios

Introducing Packet Monitor

Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the ... continue reading
Networking stack in traditional scenarios

Introducting Packet Monitor

Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the ... continue reading
Diagram showing how the Thunderspy attack works

Secured-core PCs help customers stay ahead of advanced data theft

Researchers at the Eindhoven University of Technology recently revealed information around “Thunderspy,” an attack that relies on leveraging direct memory access (DMA) functionality to compromise devices. An attacker with physical access to a system can use Thunderspy to read and ... continue reading