Select Page
Microsoft-logo-flag only.JPG

Check This Out! (CTO!) Guide (May 2023)

Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are trying ... continue reading
Wired for Hybrid - What's New in Azure Networking – April 2023

Wired for Hybrid – What’s New in Azure Networking – April 2023

Hello Folks, Azure Networking is the foundation of your infrastructure in Azure. Each month we bring you an update on What’s new in Azure Networking. This month is a little late since we've been traveling to conferences.  We Recorded this one ... continue reading
Chart demonstrating the segments of Microsoft's cloud-native application protection platform, including cloud security posture management, cloud workload protection, DevSecOps, and cloud infrastructure entitlement management.

The next wave of multicloud security with Microsoft Defender for Cloud, a Cloud-Native Application Protection Platform (CNAPP)

With digital transformation in the face of macroeconomic pressures, strategies to optimize both cloud environments and cloud security are increasingly appealing to enterprises. Organizations worry about vulnerabilities in code getting deployed, critical misconfigurations, overprivileged access to cloud infrastructure, and evolving ... continue reading
Azure firewall Basic serves as the hub and connects to spoke 1 and spoke 2. It includes the L3-L7 connectivity policies, Microsoft threat intelligence feature, NAT, network and application traffic filtering that allows outbound and inbound connections. Without a rule, the traffic is denied by default.

Protect against cyberattacks with the new Azure Firewall Basic

Cyberattacks continue to rise across businesses of all sizes as attackers are adapting their techniques and increasing the complexity of their operations.1 The risk of these attacks is significant for small and medium businesses (SMBs) as they usually don’t have ... continue reading
This infographic compares human creativity and machine rationality from the point of view of rules, innovation, data analysis, empathy, and constancy.

Cybersecurity health and how to stay ahead of attackers with Linda Grasso

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Linda Grasso, the founder and chief executive officer of DeltalogiX, a blog that ... continue reading
Microsoft’s approach to SaaS Security and the core product pillars: discovery, SaaS Security posture management, information protection, threat protection and app to app protection.

Microsoft shifts to a comprehensive SaaS security solution

Software as a service (SaaS) apps are ubiquitous, hybrid work is the new normal, and protecting them and the important data they store is a big challenge for organizations. Today, 59 percent of security professionals find the SaaS sprawl challenging ... continue reading
Unified Endpoint Security Management Experience Architecture

How to Manage Microsoft Defender Policies with Intune on Non-Managed Devices

Architecture and Capabilities:   From the endpoint security management architecture perspective, this scenario fulfills the gap of managing endpoint security features on unmanaged devices. For Intune managed devices, either cloud-only or co-management scenarios provided the endpoint security management capabilities. Also, ... continue reading
Guidance for technical architecture relating to Microsoft Zero Trust Principles.

Implementing a Zero Trust strategy after compromise recovery

What changes after compromise recovery? After the final compromise recovery, steps have been completed and we are back in control. There has been a round of applause and many sighs of relief.  Now what? Is everything going back to as ... continue reading

Stop Ransomware with Microsoft Security digital event presents threat intelligence in action

One of the biggest challenges in security today is visibility. And by visibility, I don’t just mean keeping an eye on ever-evolving cyberthreats, but also seeing your own security environment clearly—especially where you’re vulnerable. For defenders who are working hard ... continue reading

Cyber Signals: 3 strategies for protection against ransomware

The “as a service” business model has gained widespread popularity as growing cloud adoption has made it possible for people to access important services through third-party providers. Given the convenience and agility of service offerings, perhaps it shouldn’t be surprising ... continue reading