Q&As


Beware the Ransomware You Don't Know

Don't underestimate the impact of "double extortion," warns a top Microsoft cloud security architect.

Simplifying API Creation with Data API Builder

Leonard Lobel breaks down how the Data API Builder allows developers to effortlessly expose database objects such as tables, views and stored procedures as fully functional APIs.

A lone man walking on top of a giant database cluster

The Database Admin's Security Burden

Security is everyone's job, but in a time when data is king, SQL Server admins play a more critical role than ever in their organizations' security postures.

Tackling the Windows Deployment Challenge

Device management expert Michael Niehaus discusses the benefits and limits of image-based deployments, when to use Autopilot, and how to keep your Windows skills sharp.

Diagnosing (and Curing) Microsoft Copilot Adoption Roadblocks

If a Copilot lands in your environment and no one uses it, does it make a sound?

Why Is Modern Patching Still So Difficult?

SQL Server Expert Allan Hirt breaks down the hurdles organizations still face when keeping on top of patching and updates.

Mastering Token-Based Authentication Defense and Management

Token-based authentication is secure, but not immune to attack. Learn how you can better guard your organization.

Q&A: Unlocking Copilot's Enterprise Potential

AWS Chief Technologist John O'Neill, Sr. breaks down why Copilot has become such a dominant force for organizations, and what IT can do to further harness its usefulness.

White and Blue Boxes Graphic

USB Security Attacks Are Still a Threat

While security experts must keep an eye out on evolving threats, old vectors of attacks should not be forgotten or ignored.

The Biggest Hurdle to Automating Database Deployment is Getting Started

Automation can make IT's job a lot more simple when it comes to database management. All is needed is to take that first step.

Space Image

The Wizarding World of PowerShell

PowerShell can be wielded for both good and evil, and knowing both sides can help you keep your organization protected.

Tackling the C-Suite Security Barrier

Data security's biggest threat might not come from outside attackers, but from management getting in the way.

Breaking Down Continuous Threat Exposure Management

Being proactive is key to keeping your enterprise safe and your data secure. Learn more about Continuous Threat Exposure Management, and what it can do for your network.

Which Enterprises Should Ditch Passwords? All of Them!

As security biometrics continue to sophisticate, many organizations are still using flawed passwords to safeguard their data. That needs to change. Now.

Cloud Adoption and Cloud Migrations are NOT the Same

Understanding the distinction between the two is crucial for organizations' cloud transformation.

Can a Home Assistant System Work in the Enterprise?

Learn how IT is utilizing home automation tools to simplify their organizational workloads.

PowerShell's Bright Future

A couple of seasoned PowerShell vets break down how they see the powerful tool's next stage of evolution.

Embrace the GUI... Sometimes

The GUI, for all its faults, still has a place in IT. Infrastructure pro Greg Altman breaks down when you should rely on the GUI and what the future holds for server management.

Why Intune is Key (and why IT Isn't Using It)

Microsoft MVP Émile Cabot breaks down why Microsoft Intune is essential for endpoint security, and tackles some of our pressing questions on the state of IT security.

Blue Nebula Graphic

How Big Are the AI Security and Privacy Pitfalls?

Enterprise IT has been entrusted with the task of integrating gen AI into their environments, while grappling with emerging security and ethical issues.

Subscribe on YouTube