Select Page
diagram showing commonalities and differences between for-profit ransomware and espionage campaigns

Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective

In part two of this blog series on aligning security with business objectives and risk, we explored the importance of thinking and acting holistically, using the example of human-operated ransomware, which threatens every organization in every industry. As we exited ... continue reading
Automating quota management with Quota API.

Automating quota management with Azure Quota REST API

Enterprises are increasingly defined by the applications they use and build to run their core business processes, including the customer experiences they provide. Across all sectors, we see how companies like challenger banks, online healthcare providers, e-commerce providers, and other ... continue reading

Accelerating Department of Defense mission workloads with Azure

As the Azure engineering team continues to deliver a rapid pace of innovation for defense customers, we’re also continuing to support Department of Defense (DoD) customers and partners in delivering new capabilities to serve mission needs. In many cases, accelerating ... continue reading
Teaser.png

Importance of Browser Updates and Browser Based Security Controls

Introduction   This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. It has been a while since I have had time to sit down and write a security blog due to studying and making sure I ... continue reading

Turning the page on Solorigate and opening the next chapter for the security community

The recent Solar Winds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted ... continue reading
One Ops Question Video Series

One Ops Question Video Series

A team of Cloud Advocates have created a series of videos answering questions they've received from customers and member of the IT community covering off topics from Containers to Zero Trust Architectures. Donovan Brown, Dean Byren, Jay Gordon, Sarah Lean, ... continue reading

Customers unify hybrid and multicloud IT operations with Azure Arc

Businesses today are building and running applications across a variety of ecosystems on-premises, in multiple clouds, and on edge. To maintain agility and ensure compliance, it’s critical to an organization’s success to effectively manage servers, applications, and data at scale—regardless ... continue reading
Lists the six values Microsoft brings to operators with the Azure for Operators initiative

Future-proof your network with Azure for Operators

Increasing competition and ever-growing demand for mobile, always-on services challenges operators to find new strategies to grow profits and gain a competitive edge. To succeed, operators also need to embrace three critical trends: Changing the economics of their service model ... continue reading

Building modern hybrid applications with Azure Arc and Azure Stack

Thomas Maurer joins Scott Hanselman to show how developers can be more collaborative in developing, deploying, and managing applications across multiple environments and clouds. Build and deploy a truly consistent app experience everywhere in your hybrid cloud using your existing ... continue reading

A playbook for modernizing security operations

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post from our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks ... continue reading