In-Depth Features


Microsoft Security Copilot & Agents

Our 1-person SOC from Down Under thinks Security Copilot is the new shiny for Microsoft and is worried they'll add so many features to it that they'll forget about those who can't afford it and who rely on non-Security Copilot features, thus missing out.

Disaster Recovery Best Practices for the Real World

Karen Lopez (@datachick) breaks down modern disaster recovery with a restore-first mindset, immutable storage, and dark data awareness.

AI's Heavy Hitters: Best Models for Every Task

In today's crowded AI landscape, organizations looking to leverage AI models are faced with an overwhelming number of options. But how to choose?

Cloud-Based macOS Systems

After writing about Orka Desktop, Tom Fenton turns his attention to the company behind it, MacStadium, and its other wares in the macOS virtualization landscape.

Adversary in The Middle (AiTM) Trends

We're going to be seeing more of these attacks, says our one-man SOC from Down Under, who explains how he uses Zero Trust and phishing-resistant MFA to protect his clients.

Data Hygiene 101: A Step-by-Step Data Cleaning Process

It's time for spring cleaning, including your enterprise data stores, says data expert Joey D'Antoni, who offers front-line data-hygiene advice straight from the IT trenches.

Gemini AI Creates Research Report and 2-Person Podcast for Free

With a new Audio Overviews feature announced Monday, Google's Gemini AI app can now create a professional-looking Deep Research report and turn it into a professional-sounding two-person AI podcast discussion in minutes, all for free.

Front-Line Expert Answers Unstructured Data Sprawl Questions

"So work with your partners to understand, what do they have, what do they recommend, what do they use so that then you're able to leverage those different tools to help figure out how can you get your arms around all this unstructured data. And the vendors should love having that opportunity to have that conversation."

The Missing Piece in the Zero Trust Puzzle

Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.

Cybersecurity for Non-Experts

A self-described "one-person Security Operations Center" deeply invested in Microsoft-centric security imparts commonsense advice for different target groups: IT pros, developers and end users.

How Useful Is New Raspberry Pi 500 'Computer in a Keyboard?'

After introducing the new device, Tom Fenton explores the Pi 500's hardware specs more thoroughly and discusses its usefulness as a home and office computer.

Hands On with Raspberry Pi 500, a Computer in a Keyboard

The Raspberry Pi 500 integrates a Pi computer into a full-sized keyboard, offering a compact computing platform, says Tom Fenton in his first look.

Hands On with Open-Source Flatcar OS for Containers

After it catches his attention at KubeCon, where it was accepted by the Cloud Native Computing Foundation as an incubating project, Tom Fenton puts it through its paces.

Prepare for Ransomware in 2025: Baseline Practices for Cloud Security

Ransomware is at an all-time high, and it will only get worse in 2025. To help organizations prepare for the new-year onslaught, cloud architect Joey D'Antoni shared his hard-won expertise, starting with the basics.

Microsoft 365 Copilot Data Governance

Paul Schnackenburg dives deep into how Microsoft Purview has prioritized data governance and security features to address the challenges of oversharing and lax permissions exposed by M365 Copilot.

Action Items for Multicloud Security Best Practices

Guidance abounds about cloud security -- apparently with little effect judging by the current state of ransomware and other attacks -- but sometimes the best advice from experts straight from the front lines is best presented in easily digestible chunks.

AI in 2025: Multimodal, Small and Agentic

To help organizations get ready, our AI expert Brien Posey weighed in with his views on the top AI trends going into 2025, seeing the transformative technology getting a huge boost from multimodal capabilities along with smaller more targeted LLMs and autonomous agents able to do things on their own.

Case Studies of Real-World SaaS Ransomware Attacks: 'They Didn't Handle It Well'

Expert guidance abounds for enterprises to protect themselves against ransomware, phishing and other cyberattacks, but sometimes that advice is more effective when dispensed with real-world examples for specific scenarios.

Containers Upward View Graphic

KubeCon 2024: A Final Wrap-Up

KubeCon 2024 Day 2: Notes from the Field

Tom Fenton finds talk about patent trolls, AI, new products and more.

Subscribe on YouTube

Upcoming Training Events

0 AM
Visual Studio Live! San Diego
September 8-12, 2025
Live! 360 Orlando
November 16-21, 2025
Cloud & Containers Live! Orlando
November 16-21, 2025
Data Platform Live! Orlando
November 16-21, 2025
Visual Studio Live! Orlando
November 16-21, 2025