Once more unto the breach
Cybersecurity strategy, protection, detection, and response
Developing your own PAW for cloud administration
In the Privileged Access Workstation guidance, we provide instructions on how to enable cloud...
Author: John Rodriguez (MSFT) Date: 06/21/2016
Closing the Jump Server Security Gap with PAWs
When I’m out and about discussing Privileged Access Workstations with customers, I hear one question...
Author: John Rodriguez (MSFT) Date: 06/16/2016
Why You Should Use RDP RestrictedAdmin
When Mark Simos and I documented Microsoft’s public guidance for deploying a Privileged Access...
Author: John Rodriguez (MSFT) Date: 06/14/2016
When requirements aren't really requirements
One of the primary roles of an architect is to develop solutions which meet business requirements....
Author: John Rodriguez (MSFT) Date: 06/13/2016
PAWs and Attack Graphs
In 2015 John Lambert penned a fantastic article on the concept of attack graphs – if you haven’t...
Author: John Rodriguez (MSFT) Date: 06/09/2016