In-Depth Features


Sealing Your Enterprises' Security Gaps

Security guru Mikael Nystrom shares his insight on the biggest problems IT face when hardening their environment.

Microsoft Defender XDR: A Unified Approach to Threat Detection and Response

Cybersecurity experts Mattias Borg and Stefan Schörling break down what you need to know about Microsoft's comprehensive security suite and how you can take the most advantage of it to protect your environment.

Securing AI Models from Attacks

Cybersecurity expert Chen Shiri breaks down the challenges of safeguarding large language models and some steps you can take to secure your organizational data.

Unleash the Power of Automation

PowerShell pro James Petty is ready to share his secrets on how IT professionals can supercharge their daily tasks with automation.

Microsoft Ignite 2024: The 10 Essential Sessions for IT Pros

Get a crash course on Windows Server 2025, brush up on your Entra know-how, find out what's up with AI agents, and learn how to secure it all because the ransomware is definitely coming.

Performance Tuning SQL Server Using Wait Statistics

Thomas LaRock: "Without a basic understanding of wait events and how the occur, you will waste a lot of time trying and guessing at how to improve the performance of a query."

The State of Windows Security: What's Coming, What's Obsolete and How To Deal

For starters, it's time to throw out the concept of regular password expirations.

Beware the Ransomware You Don't Know

Don't underestimate the impact of "double extortion," warns a top Microsoft cloud security architect.

Simplifying API Creation with Data API Builder

Leonard Lobel breaks down how the Data API Builder allows developers to effortlessly expose database objects such as tables, views and stored procedures as fully functional APIs.

A lone man walking on top of a giant database cluster

The Database Admin's Security Burden

Security is everyone's job, but in a time when data is king, SQL Server admins play a more critical role than ever in their organizations' security postures.

Tackling the Windows Deployment Challenge

Device management expert Michael Niehaus discusses the benefits and limits of image-based deployments, when to use Autopilot, and how to keep your Windows skills sharp.

Diagnosing (and Curing) Microsoft Copilot Adoption Roadblocks

If a Copilot lands in your environment and no one uses it, does it make a sound?

Why Is Modern Patching Still So Difficult?

SQL Server Expert Allan Hirt breaks down the hurdles organizations still face when keeping on top of patching and updates.

Mastering Token-Based Authentication Defense and Management

Token-based authentication is secure, but not immune to attack. Learn how you can better guard your organization.

Q&A: Unlocking Copilot's Enterprise Potential

AWS Chief Technologist John O'Neill, Sr. breaks down why Copilot has become such a dominant force for organizations, and what IT can do to further harness its usefulness.

White and Blue Boxes Graphic

USB Security Attacks Are Still a Threat

While security experts must keep an eye out on evolving threats, old vectors of attacks should not be forgotten or ignored.

The Biggest Hurdle to Automating Database Deployment is Getting Started

Automation can make IT's job a lot more simple when it comes to database management. All is needed is to take that first step.

Space Image

The Wizarding World of PowerShell

PowerShell can be wielded for both good and evil, and knowing both sides can help you keep your organization protected.

Tackling the C-Suite Security Barrier

Data security's biggest threat might not come from outside attackers, but from management getting in the way.

Breaking Down Continuous Threat Exposure Management

Being proactive is key to keeping your enterprise safe and your data secure. Learn more about Continuous Threat Exposure Management, and what it can do for your network.

Subscribe on YouTube