Select Page
Research prototype for high-level network deployment

Empowering operators on their cloud migration journey

For operators, many challenges can be involved in their journey to the cloud, some more complex than others. Here, it is important to note that when it comes to operators’ path to cloud migration, there is no such thing as ... continue reading

Diagnose and solve problems with Azure API Management Diagnostics

Khaled Zayed joins Scott Hanselman to show how to troubleshoot availability, performance, and policy issues in your API Management service using API Management Diagnostics.[0:00:00]– Introduction[0:03:43]– Demo: Troubleshooting Availability and Performance[0:07:49]– Demo: Troubleshooting Gateway Performance[0:11:59]– Demo: Troubleshooting API Policies[0:13:54]– Wrap-upAzure API ... continue reading
Enterprise-scale foundation architecture

Leverage enterprise-scale reference implementations for your cloud adoption

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure In the last couple of blog posts, we followed Tailwind Traders1 on their cloud journey and how the IT team is looking to adopt Azure as part of their ... continue reading
bwatts670_0-1617478804224.png

Exploring Anomalies with Log Analytics using KQL

Detecting anomalies in your data can be a very powerful and desired functionality. Within Azure Monitor we provide a really easy method to alert on Anomalies if they are coming from Metrics (Creating Alerts with Dynamic Thresholds in Azure Monitor ... continue reading

Zero Trust: 7 adoption strategies from security leaders

Microsoft considers Zero Trust an essential component of any organization’s security plan. We have partnered with Cloud Security Alliance, a not-for-profit organization that promotes cloud computing best practices, to bring together executive security leaders to discuss and share insights about ... continue reading
New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks targeting areas of computing that don’t have the protection of the cloud. New data shows that firmware attacks are on the rise, and businesses aren’t ... continue reading
Azure Security Benchmark framework in the Security Center regulatory compliance dashboard

Strengthen and optimize compliance in Azure Security Center

The Regulatory Compliance dashboard in Azure Security Center is an excellent tool for helping organizations understand their compliance posture relative to industry standards. Reporting on compliance with specific standards is obviously critical for regulated customers, though tracking compliance status is ... continue reading

5 reasons Databricks runs best on Azure

For any organization running big data workloads in the cloud, exceptional scale, performance, and optimization are essential. Databricks customers have multiple choices for their cloud destination. Azure Databricks is the only first-party service offering for Databricks, which provides customers with ... continue reading
Maria Puertas Calvo leaning against a wall next to an open window.

How one data scientist is pioneering techniques to detect security threats

Data science is an increasingly popular field of study that’s relevant to every industry. When Maria Puertas Calvo was a student, she never imagined that one day she would pioneer data science techniques to detect security threats. She started her ... continue reading

Limited-time free quantities offer for Azure Synapse Analytics

Customers with qualifying subscription types* can now try the new serverless SQL pool and Apache Spark pool resources in Azure Synapse Analytics using free quantities until July 31, 2021. Sign-in to your Azure Synapse Analytics account to get started. Serverless ... continue reading