Microsoft: Windows Kernel CVE-2023-32019 fix is disabled by default

Microsoft: Windows Kernel CVE-2023-32019 fix is disabled by default https://ift.tt/qSoWZ2M Microsoft has released an optional fix to address a Kernel information disclosure vulnerability affecting systems running multiple Windows versions, including the latest Windows 10, Windows Server, and Windows 11 releases. While it has a medium severity range CVSS base score of 4.7/10, Redmond has tagged […]

IaC and Containers

IaC and Containers https://ift.tt/YkaiD5M This is an article from DZone’s 2023 Containers Trend Report. For more: Read the Report There are few technologies that have seen as much attention and adoption over the last decade as Infrastructure as Code (IaC) and containers. In those years, both have improved and eventually converged to form a modern […]

Virtual Machine Storage in Windows Server Hyper-V. File vs Block: SMB3 vs iSCSI vs NVMe-oF [PART1] 

Virtual Machine Storage in Windows Server Hyper-V. File vs Block: SMB3 vs iSCSI vs NVMe-oF [PART1]  https://ift.tt/3Yl1G2k Virtual machine storage is one of the key components of the virtualized infrastructure with block and file storage being the most used storage types. Choosing either will impact the performance of VMs, apps and services you run. That is […]

Securing Veeam Hardened Repository

Securing Veeam Hardened Repository https://ift.tt/mfpXoQc After selecting the right hardware for the Veeam Backup & Replication Hardened Repository and installing the Ubuntu Linux operating system, the next step is secure the operating system according to the DISA STIG (Defense Information Systems Agency Security Technical Implementation Guides) guidelines. This blog post describes the hardening process for […]

Top 10 Pillars of Zero Trust Networks

Top 10 Pillars of Zero Trust Networks https://ift.tt/1hKQplf Introduction to Zero Trust Networks Zero trust (ZT) is a "never-trust-always-verify" framework used by IT organizations to increase defenses against external attack to steal sensitive data, private information and resources. IT and enterprise architects use zero trust architecture (ZTA) based on zero trust principles to design and […]