Select Page
Jessica

How to Automate a PKI Configuration for an Existing Azure VM in Microsoft Azure

Jessica, our (fictitious) cloud engineer at our (fictitious) Adatum consulting firm, has just built an Azure development lab environment using Infrastructure-As-Code, and feels quite pleased, but now her team lead Jason is asking her what their plan is for development ... continue reading
Magic Quadrant for Full Life Cycle API Management

Microsoft is a Leader in the 2020 Gartner Magic Quadrant for Full Life Cycle API Management

We are excited to share that Microsoft has been named a Leader in the Gartner Magic Quadrant for Full Life Cycle API Management 2020 based on the ability to execute and completeness of vision. Our placement is a testament to ... continue reading
CAYF1.png

Cloud Attach Your Future – Part II – “The Big 3”

When the global pandemic started, we were all thrust into the new (and very lightly explored) area of managing devices remotely 100% of the time. Of course, everyone rushed to their VPN solution only to uncover new obstacles and even ... continue reading
™

Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security

Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world ... continue reading
p1.png

The Case of a Compromised Exchange Online User

  Hi Everyone,   Zoheb here again with my colleague Simon Woolley from the beautiful city of Dubai and today we will be sharing some details on how we helped one of our SMC customer find a compromised user and ... continue reading

Scaling Microsoft Kaizala on Azure

This post was co-authored by Anubhav Mehendru, Group Engineering Manager, Kaizala. Mobile-only workers depend on Microsoft Kaizala—a simple and secure work management and mobile messaging app—to get the work done. Since COVID-19 has forced many of us to work from ... continue reading
Azure Maps interactive vector tiles in Power Apps.

General availability of Azure Maps support for Azure Active Directory, Power Apps integration, and more

This blog post was co-authored by Chad Raynor, Principal Program Manager, Azure Maps. New and recent updates for Microsoft Azure Maps include support for Azure Maps integration with Azure Active Directory (generally available), integration with the Microsoft Power Apps platform, ... continue reading
An image of the workflows and visualizations to manage cases.

Microsoft Advanced Compliance Solutions in Zero Trust Architecture

Zero Trust revolves around three key principles:  verify explicitly, use least privileged access, and assume breach.  Microsoft’s Advanced Compliance Solutions are an important part of Zero Trust. This post applies a Zero Trust lens to protecting an organization’s sensitive data ... continue reading
Design a hybrid Domain Name System solution with Azure

Design a hybrid Domain Name System solution with Azure

Domain Name System (DNS) has a bad reputation for always being at fault if there are any issues with system connectivity and availability. This critical service translates "friendly" system names to network IP addresses, much like looking up a physical ... continue reading
An image of a GADOLINIUM controlled Microsoft TechNet profile established in 2016.

Microsoft Security—detecting empires in the cloud

Microsoft consistently tracks the most advanced threat actors and evolving attack techniques. We use these findings to harden our products and platform and share them with the security community to help defenders everywhere better protect the planet. Recently, the Microsoft ... continue reading