Column for Virtualizationreview.com – A Look at Security in the Microsoft Cloud, Part 2: Azure Deployments

This is the final recently published article that I’m catching up on, this is the second column for virtualizationreview.com, covering security features that you can use in Azure. Read it here.

Enjoy! And thanks for reading.

Column for Virtualizationreview.com – A Look at Security in the Microsoft Cloud

I’m still catching up on recent articles that have been published, this post is an in-depth look at security in Microsoft 365, both the “normal” SKUs and the more expensive flavours, in my monthly column at virtualizationreview.com. Read it here.

It’s part one of a two parter, my next column covers security in Azure.

Enjoy! And thanks for reading.

Azure Confidential Computing for 4Sysops

I’m catching up on articles of mine that have been published over the last month. First up is a piece over at 4sysops on Azure Confidential Computing. This is really cool technology, using Intel Processors with enclaves where you can run code and decrypt data that no other process on the machine has access to. It’s early days but ACC is going to change how we do secure computing.

Read it here.

Enjoy! And thanks for reading.

Column for Virtualizationreview.com – A Look at Azure Confidential Computing

Back in early February my first monthly column over at virtualizationreview.com was published. In this one I review Azure Confidential Computing, how it works and what the benefits may be in the future. Read it here.

Enjoy! And thanks for reading.

Column for Virtualizationreview.com – Tips & Tricks To Secure and Optimize Azure VMs

In this month’s column for virtualizationreview.com I round off the three part series with a look at IaaS VM security, how to access VMs, how to optimize networking and how to use Security Center with your IaaS deployments.  Read it here.

Enjoy! And thanks for reading.

Azure Advanced Threat Protection for 4Sysops

My post on Azure Advanced Threat Protection is now live on 4sysops. AATP is the same tool as Advanced Threat Analytics (ATA) that Microsoft has had in market for a few years, except it’s a cloud service and there’s no on-premises infrastructure except for agents that collect events and network data from your Domain Controllers. There’s no better way to protect yourself from Pass The Hash and all the related attacks than AATP/ ATP. Read it here.

Enjoy! And thanks for reading.