When it comes to enterprise security, you're not paranoid -- everyone is out to get you.
Now that Microsoft is cancelling TechEd and other conferences, what's to expect from the company's recently announced mega conference?
Here's how to use the Failover Cluster Manager to make virtual machines fault tolerant or to create new virtual machines.
The test sent many security software offerings through a gauntlet to measure protection, useability and performance. Three received a perfect score of 30.
Microsoft is downplaying the disclosure and has offered multiple ways IT can avoid attack.
The question leads to an even more important question: do your users care?
- By Denny Cherry
While the InstallShield flaw currently has a limited workaround, there's no word on whether the Dell problem is further being investigated by Microsoft.
Follow these step-by-step instructions and you will be up and running in about 15 minutes.
The update will prevent the spoofed certificates from being used in man-in-the-middle attacks.
This combination may end up being the command-line replacement for System Center Configuration Manager.
- By Greg Shields
The lawyer and journalist responsible for providing many of the details on government surveillance from Edward Snowden conducted an online Q&A on Wednesday.
Microsoft's monthly security update comes with fixes for 29 flaws and includes three updated security advisories.
Redmond is now strongly focused on making sure all your devices play nicely with one another, no matter where you are or what OS you're running.
- By Mary Jo Foley
Target. Equifax. Michaels. Heartbleed. IT security breaches and exploits just keep rolling in and for most companies, it hasn't made a bit of difference.
Microsoft's "personal assistant" feature may drastically change the way we interact with both Windows OS and Windows Server in the future. Here's why.
While NoSQL has taken over many of the duties that the relational database engine used to do, relying only on NoSQL could lead to some issues.
- By Denny Cherry
The new cloud-based platform looks to streamline threat information to make it easier for users and machines to access and read.
The right answer may not be right for every enterprise.
Here's a step-by-step instruction on how to create a number of site collections, content databases and how to combine them.
- By Spike Xavier
The most recent high-profile offering comes from HP with its split-key cloud security suite.