Select Page
Confidential Virtual Machine in Azure Portal.

Meet PCI compliance with credit card tokenization

In building and running a business, the safety and security of your and your customers' sensitive information and data is a top priority, especially when storing financial information and processing payments are concerned. The Payment Card Industry Data Security Standard ... continue reading

The path forward for SQL Server analytics

Today, we are announcing changes to SQL Server analytics which includes:Customer feedbackRetirement of SQL Server 2019 Big Data ClustersRetirement of PolyBase scale-out groupsPath forwardCustomer feedbackWe continue to see increased migration to the cloud, with analytical workloads leading that charge.Customers have ... continue reading
Azure VMware Solution (AVS) for VMware Admins Primer

Azure VMware Solution (AVS) for VMware Admins Primer

It’s funny to think there was such a pushback on virtualization when it first came out versus being the norm for most of us now. As a VMware admin myself, I remember all the discussions with application teams trying to ... continue reading
RAN architectural evolution and innovations in 5G networks.

The intersection of edge computing, telecommunications networks, and the cloud

It’s been 12-plus years since we embarked on the paradigm-shifting edge computing story, which brings the cloud closer to the source of data generation and consumption. Nowadays, the cloud provides resource-rich compute and storage capabilities, remote management, and new applications ... continue reading
Deep dive: How Azure AD Kerberos works

Deep dive: How Azure AD Kerberos works

If you have ever explored the differences between Active Directory (AD DS) and Azure Active Directory (Azure AD), you would have found that Azure Active Directory doesn't support the Kerberos authentication protocol, but Active Directory does. Kerberos is used to ... continue reading
Azure Space ecosystem showing multi-orbits and geospatial capabilities through Machine Learning.

New satellite connectivity and geospatial capabilities with Azure Space

Figure 1: Azure Space ecosystem showing multi-orbits and geospatial capabilities through Machine Learning. Last year, Microsoft announced Azure Space, bringing together the possibilities of Space with the power of the cloud to help people and organizations achieve more on and ... continue reading
Homepage of the Vulnerable and Malicious Driver Reporting Center.

Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center

Windows 10 and Windows 11 have continued to raise the security bar for drivers running in the kernel. Kernel-mode driver publishers must pass the Hardware Lab Kit (HLK) compatibility tests, malware scanning, and prove their identity through extended validation (EV) ... continue reading
Stages of attack with tools and techniques used in the REvil ransomware attack on Kaseya

New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure

In the current pandemic-driven remote work environments, security has become increasingly important. Earlier this year, Colonial Pipeline, one of the leading suppliers of fuel on the East Coast of the United States, was hit by a ransomware attack.1 This caused ... continue reading
bake13_0-1635332214539.png

SQL Server 2019 PolyBase feature High Availability

One of the most exciting aspects of SQL Server 2019 are the enhanced capabilities around the PolyBase feature that enables access to non-SQL Server external data sources through a process referred to as virtualization. The data remains at the external ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading