Select Page
Secure authentication method provisioning with Temporary Access Pass

Secure authentication method provisioning with Temporary Access Pass

Howdy folks, I’m happy to announce the general availability of Temporary Access Pass (TAP). We’ve made a lot of progress since we announced the public preview of TAP. “…We use the MS Authenticator for passwordless sign in. That is the ... continue reading

Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog ... continue reading
Azure Blog AI

Responsible AI investments and safeguards for facial recognition

A core priority for the Cognitive Services team is to ensure its AI technology, including facial recognition, is developed and used responsibly. While we have adopted six essential principles to guide our work in AI more broadly, we recognized early ... continue reading

Azure IoT increases enterprise-level intelligent edge and cloud capabilities

For Microsoft Azure IoT, our approach is connecting devices at the edge to the cloud seamlessly and securely to help customers achieve desired business outcomes. At this year’s Embedded World 2022, we’ll share how our Azure IoT solutions are delivering ... continue reading
A screenshot of the Backup via URL GUI on Azure Data Studio.

What’s new with SQL Tools

Hello community, the June release of Azure Data Studio 1.37 is here! We are also excited to announce the release of SQL Server Management Studio (SSMS) 18.12. In this Azure Data Studio release, backup and restore to URL was introduced ... continue reading
Logs with time stamps showing start and completion of the core network deployment.

Azure powers rapid deployment of private 4G and 5G networks

As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading
Logs with time stamps showing start and completion of the core network deployment.

Azure powers rapid deployment of private 4G and 5G networks

As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading
BrandonWilson_0-1654703414788.png

A Light Overview of Microsoft Security Products

Hi, Alan here today to lightly cover something I have been asked by customers in regard to Microsoft’s security products....and that is “what defender products does Microsoft have and what are they used for?”. Well, it’s a good question, so ... continue reading
Pod Identity or gMSA? Which one is best for you on Azure Kubernetes Service

Pod Identity or gMSA? Which one is best for you on Azure Kubernetes Service

This blog post is the result of a conversation I had last week with a customer, in which we discussed the implementation of Group Managed Service Accounts (gMSA) on Azure Kubernetes Service (AKS) for their application. The result of the ... continue reading
Exposing POLONIUM activity and infrastructure targeting Israeli organizations

Exposing POLONIUM activity and infrastructure targeting Israeli organizations

Microsoft successfully detected and disabled attack activity abusing OneDrive by a previously undocumented Lebanon-based activity group Microsoft Threat Intelligence Center (MSTIC) tracks as POLONIUM. The associated indicators and tactics were used by the OneDrive team to improve detection of attack ... continue reading