Select Page

Monitoring Storage Replication – Part 2

Introduction Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia.   This is part 2 of Monitoring Storage Replication, if you missed part 1 you can find it HERE.   In part 1, we configured an ... continue reading

SEC cyber risk management rule—a security and compliance opportunity

In my practice as a Microsoft Global Black Belt, I focus on the technical and business enablement aspects of protecting organizations from cyber threats with tools like Microsoft 365 Defender, Microsoft Purview and Microsoft Sentinel. In my role as a ... continue reading

Identity Innovation for a More Secure Nation

With more than 1000 identity attacks occurring each second1, government agencies are tasked with serving the public amidst the most challenging cybersecurity environment in history. Protecting the freedom of citizens makes them a prime target for bad actors across the ... continue reading

5 reasons to adopt a Zero Trust security strategy for your business

Adopting Zero Trust security for your enterprise is no longer a wish-list item—it’s a business imperative. The workplace today extends to almost anywhere, anytime, from any device. Siloed, patchwork security solutions leave gaps that threat actors continue to exploit. A ... continue reading

Monitoring Storage Replication – Part 1

Introduction   Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. We all know how frustrating it can be to receive a call about a storage account not replicating or being unable to fail over. To ... continue reading
This infographic compares human creativity and machine rationality from the point of view of rules, innovation, data analysis, empathy, and constancy.

Cybersecurity health and how to stay ahead of attackers with Linda Grasso

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Linda Grasso, the founder and chief executive officer of DeltalogiX, a blog that ... continue reading
Aditya Thadani, Vice President at H&R Block, headshot photo accompanied by a pull quote that says “the updates we made came just in time or we would have faced a much bigger problem.”

H&R Block’s blockbuster data strategy

If you think your company isn’t making the most of its data, you’re probably right. Just ask H&R Block. In 2019, before most people began sheltering in place due to COVID, the company rolled out a new data platform that ... continue reading

Sorry, OneDrive can’t add your folder right now

Hi community,     Introduction  Hello everyone, my name is Dave Guenthner, and I am a Senior FastTrack Architect (FTA) at Microsoft.  The purpose of this blog is to share a recent customer problem and provide suggestions for resolution. Working in Fast ... continue reading
Diagram showing Security Research Findings, Penetration Testing and Deep Security Reviews, and Threat Modeling as inputs into the Variant Hunting process. The outcomes from Variant Hunting are Long-term Controls and Systemic Improvements, Short-term mitigations and controls, and Standardized Controls in SDL.

Microsoft Azure Security expands variant hunting capacity at a cloud tempo

In the first blog in this series, we discussed our extensive investments in securing Microsoft Azure, including more than 8500 security experts focused on securing our products and services, our industry-leading bug bounty program, our 20-year commitment to the Security ... continue reading

What is an Azure Load Balancer?

  A lot of folks who are new to Azure assume that load balancers in Azure are logically equivalent to load balancers in their on-premises data centers.  These load balancers are typically a device (sometimes a VM) which functions as ... continue reading