Select Page
Image of the Top 100 sign at the Black Hat Conference.

Finding the signal of community in all the noise at Black Hat

I dont know about you, but I find large conferences overwhelming. Dont get me wrong, nothing beats the innovative potential of bringing a diverse group of brilliant people together to hash through thorny issues and share insights. But there are ... continue reading

Everything you need to know about Windows Server 2019 – Part 1

This blog post was authored by Vinicius Apolinario, Senior Product Marketing Manager, Windows Server. You should know by now that Windows Server 2019 is available as a preview in the Windows Insiders program. In the last few months, the Windows ... continue reading
Hyper-V HyperClear Mitigation for L1 Terminal Fault

Hyper-V HyperClear Mitigation for L1 Terminal Fault

Introduction A new speculative execution side channel vulnerability was announced recently that affects a range of Intel Core and Intel Xeon processors. This vulnerability, referred to as L1 Terminal Fault (L1TF) and assigned CVE 2018-3646 for hypervisors, can be used ... continue reading
Bloombase StoreSafe

Azure Marketplace new offers: July 1–15

We continue to expand the Azure Marketplace ecosystem. From July 1 to 15, 97 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Virtual Machines Bloombase StoreSafe: Bloombase StoreSafe delivers agentless, non-disruptive, ... continue reading
Protecting the modern workplace from a wide range of undesirable software

Protecting the modern workplace from a wide range of undesirable software

Security is a fundamental component of the trusted and productive Windows experience that we deliver to customers through modern platforms like Windows 10 and Windows 10 in S mode. As we build intelligent security technologies that protect the modern workplace, ... continue reading

Cryptojacking – Leeches of the Internet

Hello, this is Paul Bergson again with another topic on security. The threat of malware continues to impact business with no relief in sight. The latest topic brought back childhood memories of how the “Leeches” of the internet prey upon ... continue reading

Experts tips on hardening security with Azure security

Note: This blog was authored by the Microsoft Threat Intelligence Center. Microsoft Azure provides a secure foundation for customers to host their infrastructure and applications. Microsoft’s secure foundation spans across physical, infrastructure, and operational security. Part of our operational security ... continue reading
Attack inception: Compromised supply chain within a supply chain poses new risks

Attack inception: Compromised supply chain within a supply chain poses new risks

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF editor application and one ... continue reading
Image of a Moomin keychain sitting on a hotel desk.

Be like a Moomin: How to establish trust between competitors so we can fight cybercrime

Do you know the Moomins? They’re a tight-knit, happy, collaborative cartoon family. I’d never heard of them until I was lucky enough to spend a few days at the Microsoft offices in Helsinki, Finland. The Moomin keychain in the photo ... continue reading