This is the final recently published article that I’m catching up on, this is the second column for virtualizationreview.com, covering security features that you can use in Azure. Read it here.
Enjoy! And thanks for reading.
This is the final recently published article that I’m catching up on, this is the second column for virtualizationreview.com, covering security features that you can use in Azure. Read it here.
Enjoy! And thanks for reading.
I’m still catching up on recent articles that have been published, this post is an in-depth look at security in Microsoft 365, both the “normal” SKUs and the more expensive flavours, in my monthly column at virtualizationreview.com. Read it here.
It’s part one of a two parter, my next column covers security in Azure.
Enjoy! And thanks for reading.
The last of my recent posts for 4sysops is a review of FolderSecurityViewer (FSV) – a standalone utility that analyses and reports on NTFS permissions for local and remote file shares. It’s very powerful and if reporting on effective share permissions is a requirement you have, give FSV a go. Read the review here.
Enjoy! And thanks for reading.
I’m catching up on articles of mine that have been published over the last month. First up is a piece over at 4sysops on Azure Confidential Computing. This is really cool technology, using Intel Processors with enclaves where you can run code and decrypt data that no other process on the machine has access to. It’s early days but ACC is going to change how we do secure computing.
Read it here.
Enjoy! And thanks for reading.