Select Page
01hba.png

Azure AD Application Proxy now natively supports apps that use header-based authentication

Howdy folks, It’s awesome to hear from many of you that Azure AD Application Proxy helps you in providing secure remote access to critical on-premises applications and reducing load from existing VPN solutions. We’ve also heard about the need for ... continue reading
Purdue Model traversal in TRITON attack

Go inside the new Azure Defender for IoT including CyberX

In 2020, the move toward digital transformation and Industry 4.0 took on new urgency with manufacturing and other critical infrastructure sectors under pressure to increase operational efficiency and reduce costs. But the cybersecurity model for operational technology (OT) was already ... continue reading
WindowsAdminCenter-Start.png

Using Windows Admin Center on-premises to manage Azure Windows Server VMs

Contributed by @Orin Thomas Currently the Windows Admin Center (WAC) add-in for the Azure Portal is in preview. Unfortunately, at the time of writing, the preview is oversubscribed, and you might be waiting for a while before the feature becomes ... continue reading
Legacy access model

Modernize secure access for your on-premises resources with Zero Trust

Change came quickly in 2020. More likely than not, a big chunk of your workforce has been forced into remote access. And with remote work came an explosion of bring-your-own-device (BYOD) scenarios, requiring your organization to extend the bounds of ... continue reading

Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA here.   Security teams are struggling to reduce the time to detect and respond to threats due to the complexity and volume ... continue reading

Monitoring AKS with Azure Sentinel

Sarah and Damien discuss Azure Sentinel – Microsoft's cloud SIEM solution – and how you can use this to implement security monitoring for your AKS clusters.Learn More:Monitoring AKS with Azure SentinelTop 10 Best Practices for Azure Security Microsoft Cybersecurity Reference ... continue reading
Connecting urban environments with IoT and Digital Twins

Connecting urban environments with IoT and Digital Twins

As urbanization continues to take hold and cities face challenges to become more sustainable and livable, urban planning and operations strategies must adapt. The current pandemic has changed the way we live, accelerating cities’ future vision as a necessity of ... continue reading
Diagram showing process of isolation in System Management Mode

System Management Mode deep dive: How SMM isolation hardens the platform

Ensuring that the platform firmware is healthy and trustworthy is fundamental to guaranteeing that powerful platform security features like Hypervisor-protected code integrity (HVCI) and Windows Defender Credential Guard are functioning as expected. Windows 10 achieves this by leveraging a hardware-based ... continue reading
Text reads digital event Open Azure Day November 18 2020 10 A M P T run Linux apps your way on azure. There is also a word cloud in the form of a heart

Open Azure Day: A VIP Linux and OSS speaker line-up in one event

The Linux and open-source landscapes are changing rapidly. With so many companies embracing remote work and operations this year, we’re seeing more organizations running large-scale, mission-critical Linux and open-source workloads than ever before. IT teams need technical resources that can ... continue reading
Back to the future: What the Jericho Forum taught us about modern security

Back to the future: What the Jericho Forum taught us about modern security

Some of the earliest formal work on what we now call Zero Trust started around in a security consortium known as the Jericho Forum (which later merged into The Open Group Security Forum). This started as a group of like-minded ... continue reading