Select Page
Improve cyber supply chain risk management with Microsoft Azure

Improve cyber supply chain risk management with Microsoft Azure

For years, Microsoft has tracked threat actors exploiting federal cyber supply chain vulnerabilities. Supply chain attacks target software developers, systems integrators, and technology companies. Tactics often include obtaining source code, build processes, or update mechanisms to compromise legitimate applications. This ... continue reading

Use Azure Automation to onboard VMs to Log Analytics

Hello, Chris Wallen here and in this post, I'm going to show how you can use an automation runbook to onboard Windows and Linux VMs to a Log Analytics workspace. Before we get started with the code portion, there are ... continue reading
clipboard_image_0.jpeg

BitLocker, Intune, and Raven

Hello Paul Bergson, back again with another story about my dog Raven. From time to time we get a visit from a family member and they will bring their dog along, problem is we have never socialized Raven with other ... continue reading
Gartner graph showing Microsoft as a Leader in Cloud App Security.

Microsoft Security—a Leader in 5 Gartner Magic Quadrants

Gartner has named Microsoft Security a Leader in five Magic Quadrants. This is exciting news that we believe speaks to the breadth and depth of our security offerings. Gartner places vendors as Leaders who demonstrate balanced progress and effort in ... continue reading
Spear phishing campaigns—they’re sharper than you think

Spear phishing campaigns—they’re sharper than you think

Even your most security-savvy users may have difficulty identifying honed spear phishing campaigns. Unlike traditional phishing campaigns that are blasted to a large email list in hopes that just one person will bite, advanced spear phishing campaigns are highly targeted ... continue reading
Use Azure Automation to Install and Configure the Log Analytics Extension

Use Azure Automation to Install and Configure the Log Analytics Extension

Hello, Chris Wallen here and in this post, I'm going to show how you can use an Azure Automation runbook to deploy and configure the Log Analytics extension to a group of virtual machines running either Windows or Linux. Before ... continue reading
Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant

Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant

We often hear from customers about the explosion of data, and the challenge this presents for organizations in remaining compliant and protecting their information. We’ve invested in capabilities across the landscape of information protection and information governance, inclusive of archiving, ... continue reading
Timeline of evolution of Dexphot malware

Insights from one year of tracking a polymorphic threat

A little over a year ago, in October 2018, our polymorphic outbreak monitoring system detected a large surge in reports, indicating that a large-scale campaign was unfolding. We observed as the new threat attempted to deploy files that changed every ... continue reading

Going in-depth on the Windows 10 random number generation infrastructure

Throughout the years, we’ve had ongoing conversations with researchers, developers, and customers around our implementation of certain security features within the Windows operating system. Most recently, we have open-sourced our cryptography libraries as a way to contribute and show our ... continue reading
Rethinking cyber learning—consider gamification

Rethinking cyber learning—consider gamification

As promised, I’m back with a follow-up to my recent post, Rethinking how we learn security, on how we need modernize the learning experience for cybersecurity professionals by gamifying training to make learning fun. Some of you may have attended ... continue reading