Our Latest News
Pair Programming and test-driven development with Visual Studio Live Share and GitHub Copilot
Pair programming is a software development technique in which two developers work together on the same code at the same time, with one typing and the other reviewing and offering suggestions. This technique can increase productivity and promote knowledge sharing, as...
Monitoring Storage Replication – Part 1
Introduction Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. We all know how frustrating it can be to receive a call about a storage account not replicating or being unable to fail over. To help prevent this from happening, I am...
Step-by-Step Compliance for the Cybersecurity Maturity Model Certification (CMMC)
Odds are, if you are impacted by the Cybersecurity Maturity Model Certification (CMMC) mandates, you already know it. Odds are, if you are reading this post, you are doing research because you are impacted by the mandates. If you are impacted by the mandates, this...
Did your favorite Shark Tank celebrity really endorse THAT? Probably not
FTC to voice service provider: give the robocalls a rest
Manage opportunities more effectively with the new sales pipeline view!
The sales pipeline is a visual representation of where prospects are within the sales funnel. Managing the pipeline is one of the core activities of any seller; it helps sellers to stay organized and focused on moving deals forward. A seller who can successfully...
Get started on Microsoft Learn with these seven must-watch videos
Microsoft Learn offers a huge library of written content, including technical documentation and learning paths. But what if you need something a little more visual and demonstrative while learning new skills? Enter Microsoft Learn’s vast collection of video content. ...
CISA Releases Fifteen Industrial Control Systems Advisories
Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure...
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. This type of vulnerability is a frequent attack vector for malicious cyber actors and poses a significant risk to the federal enterprise....
Discover new ways to multitask with Microsoft 365 and Edge
Despite living in a connected world, the way we use our apps can often feel distinctly disconnected. Today, we’re announcing a new way to help you stay focused with help from two Microsoft apps that many people use daily and consistently together—the classic Microsoft...
Cisco Releases Security Advisories for Multiple Products
Cisco has released security advisories for vulnerabilities affecting multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco...
Enable IT personnel to monitor SQL health and performance while reducing the insider risk
It is common that IT personnel tasked with monitoring the health and performance of database systems be given very high privileges such as SQL sysadmin. This enables them to do their job but comes with significant risks. Those privileges enable them to read or modify...

Recent Comments