Select Page

The edge of possibility: best practices for IoT-driven infrastructure transformation

Azure
Corporate IT infrastructure has changed a lot in the past decade. From a relatively simple bounded space, with a defined “inside” and “outside,” IT networks have evolved to incorporate a wider range of devices, such as smartphones and tablets, and ... continue reading
Microsoft Graph Security API block diagram

Azure.Source – Volume 28

Azure
Azure Security News at RSA Conference 2018 Last week, we made several Azure Security announcements in conjunction with RSA Conference 2018 in San Francisco: Introducing Microsoft Azure Sphere: Secure and power the intelligent edge - Microsoft Azure Sphere is a ... continue reading
To learn about provisioning and TPMs, go to: https://aka.ms/dps-tpm

Unique identities are hard: How I learned to stop worrying and love the ID scope

Azure
Behold the ID scope, one of the most nuanced concepts in the IoT Hub Device Provisioning Service. It is both reviled and lauded for its name-spacing characteristics in device provisioning. It throws a wrench in complex provisioning scenarios, but it’s ... continue reading

What is Azure SQL Database Managed Instance?

Azure SQL Database Managed Instance is a new flavor of Azure SQL Database that represents fully managed SQL Server Instance hosted in Azure cloud. Currently, Azure SQL Database has two main offers for the customers who use SQL Server database ... continue reading

Best practices for securely moving workloads to Microsoft Azure

Security
Azure is Microsofts cloud computing environment. It offers customers three primary service delivery models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Adopting cloud technologies requires a shared responsibility model for ... continue reading
How to mitigate rapid cyberattacks such as Petya and WannaCrypt

How to mitigate rapid cyberattacks such as Petya and WannaCrypt

Security
In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and ... continue reading
image

Monitor network connectivity to applications with NPM’s Service Endpoint Monitor – public preview

Azure
As more and more enterprises are hosting their applications in cloud and are relying more on SaaS and PaaS applications to provide services, they are increasingly becoming dependent on multiple external applications and the networks in between. The traditional network ... continue reading
#Microsoft Secure #DevOps Kit of #Azure to Secure your Cloud #Security

#Microsoft Secure #DevOps Kit of #Azure to Secure your Cloud #Security

Overview The “Secure DevOps Kit for Azure” (will be referred to as ‘AzSDK’ henceforth) is a collection of scripts, tools, extensions, automations, etc. that caters to the end to end Azure subscription and resource security needs for dev ops teams ... continue reading

Last week in Azure: Securing Azure infrastructure from CPU vulnerability, and more

Azure
As we ushered in 2018, our industry was busy responding to an industry-wide, hardware-based security vulnerability related to CPU data cache timing. We updated the Azure infrastructure to address this vulnerability at the hypervisor level. You can get more details ... continue reading
Loading...