Select Page
Microsoft-logo-flag only.JPG

Check This Out! (CTO!) Guide (May 2023)

Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some content of interest, and are just a way we are trying ... continue reading
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Microsoft has uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States. The attack is carried out by Volt Typhoon, a state-sponsored actor based in China ... continue reading
Graphic showing a range of identity protection methods, going from bad to best. The first column on the left shows bad passwords; the second column shows good password; the third column shows better passwords; and the fourth column shows best passwords.

How Microsoft can help you go passwordless this World Password Day

It’s that time of year again. World Password Day is May 4, 2023.1 There’s a reason it’s still going strong 10 years after being created by cybersecurity professionals. A recent study that analyzed more than 15 billion passwords found that ... continue reading
Headshot of Antigoni Chrysostomou

ISC 2023: Experience the power of HPC in the cloud with Microsoft Azure

The ISC High-Performance Event (ISC), formerly known as International Supercomputing Conference, is one of the most important events in the high-performance computing (HPC) industry, bringing together some of the world's most prominent researchers, developers, vendors, and users to discuss the ... continue reading
GraemeBray_0-1682363746265.png

Reporting on Azure AD Password Protection

Hi everyone! It's been a long time, but Graeme Bray here with you to talk about an Azure Monitor workbook you can deploy in your environment to help you report on your Azure AD Password Protection.  You are running AAD ... continue reading

What’s new in Azure Data & AI: Helping organizations manage the data deluge

When I meet with customers and partners, one thing is clear: nearly every organization is looking to accelerate its use of data to drive strategic outcomes. Generating data isn’t the issue. By 2025, IDC estimates the world will surpass 181 zettabytes ... continue reading
Image showing data going through the cloud.

Managing IP with Microsoft Azure and Cliosoft

This blog was co-authored by Fernando Aznar Cornejo, AMD Partner Development Manager; Nathaniel Lum, Senior Applications Engineer, Cliosoft; Amit Varde, Director – Solutions Engineering, Cliosoft. Intellectual Property (IP) is a critical asset for technology companies, encompassing a company's patents, trademarks, ... continue reading
A lock with a circular arrow around it and several icons depicting a fingerprint, a robot, files, and a laptop and cell phone.

Stay compliant and protect sensitive data with Zero Trust security

Regulatory standards frequently shift and tighten, especially with the rise of hybrid work environments. And with the explosion of data growth, organizations have seen a massive uptick in cybersecurity issues and needs. According to IBM’s 2022 Cost of a Data ... continue reading
™

Simplified endpoint management with Microsoft Intune Suite: Adopting a long-term approach with intelligence and automation

The last couple of years have been difficult, with many organizations operating in a response mode. From a global pandemic to an economic downturn to increasing security risks, teams are under more pressure than ever to deliver greater cyber security ... continue reading
Diagram of Mint Sandstorm attack chain examples

Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets

Over the past several months, Microsoft has observed a mature subgroup of Mint Sandstorm, an Iranian nation-state actor previously tracked as PHOSPHORUS, refining its tactics, techniques, and procedures (TTPs). Specifically, this subset has rapidly weaponized N-day vulnerabilities in common enterprise ... continue reading