
Meet PCI compliance with credit card tokenization
In building and running a business, the safety and security of your and your customers' sensitive information and data is a top priority, especially when storing financial information and processing payments are concerned. The Payment Card Industry Data Security Standard ... continue reading
The path forward for SQL Server analytics
Today, we are announcing changes to SQL Server analytics which includes:Customer feedbackRetirement of SQL Server 2019 Big Data ClustersRetirement of PolyBase scale-out groupsPath forwardCustomer feedbackWe continue to see increased migration to the cloud, with analytical workloads leading that charge.Customers have ... continue reading
Azure VMware Solution (AVS) for VMware Admins Primer
It’s funny to think there was such a pushback on virtualization when it first came out versus being the norm for most of us now. As a VMware admin myself, I remember all the discussions with application teams trying to ... continue reading

The intersection of edge computing, telecommunications networks, and the cloud
It’s been 12-plus years since we embarked on the paradigm-shifting edge computing story, which brings the cloud closer to the source of data generation and consumption. Nowadays, the cloud provides resource-rich compute and storage capabilities, remote management, and new applications ... continue reading
Deep dive: How Azure AD Kerberos works
If you have ever explored the differences between Active Directory (AD DS) and Azure Active Directory (Azure AD), you would have found that Azure Active Directory doesn't support the Kerberos authentication protocol, but Active Directory does. Kerberos is used to ... continue reading

New satellite connectivity and geospatial capabilities with Azure Space
Figure 1: Azure Space ecosystem showing multi-orbits and geospatial capabilities through Machine Learning. Last year, Microsoft announced Azure Space, bringing together the possibilities of Space with the power of the cloud to help people and organizations achieve more on and ... continue reading

Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center
Windows 10 and Windows 11 have continued to raise the security bar for drivers running in the kernel. Kernel-mode driver publishers must pass the Hardware Lab Kit (HLK) compatibility tests, malware scanning, and prove their identity through extended validation (EV) ... continue reading

New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure
In the current pandemic-driven remote work environments, security has become increasingly important. Earlier this year, Colonial Pipeline, one of the leading suppliers of fuel on the East Coast of the United States, was hit by a ransomware attack.1 This caused ... continue reading
SQL Server 2019 PolyBase feature High Availability
One of the most exciting aspects of SQL Server 2019 are the enhanced capabilities around the PolyBase feature that enables access to non-SQL Server external data sources through a process referred to as virtualization. The data remains at the external ... continue reading
NDES Security Best Practices
Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading