In-Depth Features


Inside Azure DDoS Protection: Scalable Defense Against Modern Attacks

Azure expert Aidan Finn previews how Microsoft's cloud-scale DDoS Protection detects, mitigates and monitors attacks ahead of his Live! 360 Orlando session.

Why Model Context Protocol Matters for AI Systems

In this Q&A, Microsoft’s Fabian Williams explains how Model Context Protocol brings structure, reliability and governance to prompt-based AI systems.

Redefining Cyber Resilience in the Age of AI: Commvault

How AI, identity resilience, and full-stack recovery are transforming cybersecurity, helping businesses bounce back from outages and attacks in minutes.

Building Secure Code Without Breaking the Flow

Q&A with Live! 360 Orlando speaker Alton Crossley explores "vibe coding security" and how to integrate security seamlessly into AI-assisted development workflows.

Designing Power BI for Scale: Enterprise Architecture That Works

Live! 360 speaker Reza Rad outlines the architectural fundamentals teams often overlook when scaling Power BI across the enterprise.

Securing AI in Azure: Identity, Access and Endpoint Pitfalls To Avoid

Microsoft MVP Markus Lintuala outlines the key security risks in AI service deployments and offers best practices ahead of his Live! 360 session on building secure Azure AI solutions.

Beyond Detection with Silicon-Level Defense: HP Wolf Security

Hardware-enforced isolation, always-on security and silicon-level defenses are transforming endpoint protection to stop modern threats before they cause damage -- and without relying on detection.

Securing the No-Code App Explosion: Nokod Security

Good: No-code tools like Microsoft Power Platform are fueling a surge in citizen-built apps. Bad: Most of those apps are flying under the radar of traditional security.

Q&A: Going Beyond the Basics with Windows Autopilot

Veteran deployment expert Michael Niehaus explains how IT pros can push Windows Autopilot beyond default provisioning to support deeper customization, automation and modern endpoint strategies.

Q&A: Why Now Might Be the Right Time to Rethink Hyper-V

With VMware pricing changes shaking up the market, Microsoft MVP Émile Cabot explains why Hyper-V is emerging as a cost-effective, enterprise-ready alternative for virtualization and hybrid cloud strategies.

If the Data's Gone, It Can't Be Stolen: Blancco

Hanging onto unused data is a hacker's dream, and shredding old drives isn't enough to thwart them. A robust data sanitization plan is the most underrated way to slash your attack surface.

Mastering Modern MDM: Navigating Microsoft 365 Endpoint Management

Drowning in device sprawl, inconsistent policies and security blind spots? A longtime Microsoft expert shares how to untangle the chaos.

Q&A: Making the Command Line Smarter with AI Shell

Microsoft’s AI Shell aims to transform the command-line interface by bringing intelligent, natural language assistance to cloud automation and everyday CLI workflows.

Q&A: Creating a Smarter, Cross-Platform PowerShell Profile

PowerShell expert Sean Wheeler shares insights on building smarter, cross-platform profile scripts, community-driven development and the future of PowerShell.

Q&A: PowerShell for Everyone

Jason Helmick, project manager on the PowerShell team, breaks down why the scripting language tool can be used to simplify your workflows no matter your level of expertise.

Datacenter Automation Crash Course: How To Get (Almost) Hands-Free Datacenter Management

As data volumes explode and IT complexity skyrockets, your datacenter needs AI -- and fast. This session dives into the pressing realities of modern infrastructure and the urgent shift toward intelligent, hands-free operations.

Q&A: Windows 365 Boot and the Future of Seamless Hybrid Access

Windows 365 MVP Anders Green explains how Windows 365 Boot can streamline secure access, reduce hardware costs and support flexible work.

Rocks

Q&A: Mastering Cyber Forensics and Detecting the Undetectable

Cybersecurity expert Paula Januszkiewicz shares how IT pros can uncover hidden threats and sharpen their forensic skills ahead of her TechMentor session this August.

Why Its Time to Move Beyond VPNs

Microsoft security expert Richard Hicks explains why now is the time for enterprises to replace legacy VPNs with Entra Private Access and adopt a Zero Trust network access model.

Q&A: Practical AI Strategies for IT Pros

AI expert Ana Inés Urrutia shares how IT pros can harness AI today to streamline operations, enhance decision-making and prepare for the future of work.

Subscribe on YouTube