Select Page

Accelerating Department of Defense mission workloads with Azure

As the Azure engineering team continues to deliver a rapid pace of innovation for defense customers, we’re also continuing to support Department of Defense (DoD) customers and partners in delivering new capabilities to serve mission needs. In many cases, accelerating ... continue reading
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

A deep dive into serverless applications on Power Apps and Azure

In 2021, each month we will be releasing a monthly blog covering the webinar of the month for the low-code application development (LCAD) on Azure solution. LCAD on Azure is a new solution to demonstrate the robust development capabilities of ... continue reading

Turning the page on Solorigate and opening the next chapter for the security community

The recent Solar Winds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted ... continue reading
Diagram distinguishing between events, alerts and incidents

6 strategies to reduce cybersecurity alert fatigue in your SOC

Today, organizations are faced with the increasingly difficult task of trying to protect their expanding digital estate from sophisticated cybersecurity threats. Migration to the cloud and a mobile workforce has dissolved the network boundary and projected the digital estate beyond ... continue reading

Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic

Cybersecurity professionals find themselves in high demand as organizations worldwide continue to grapple with how to secure millions of remote workers. James Turner is an industry analyst at CISO Lens and served as an adjudicator from 2017 to 2019 for ... continue reading
Lists the six values Microsoft brings to operators with the Azure for Operators initiative

Future-proof your network with Azure for Operators

Increasing competition and ever-growing demand for mobile, always-on services challenges operators to find new strategies to grow profits and gain a competitive edge. To succeed, operators also need to embrace three critical trends: Changing the economics of their service model ... continue reading
Web shell attacks continue to rise

Web shell attacks continue to rise

One year ago, we reported the steady increase in the use of web shells in attacks worldwide. The latest Microsoft 365 Defender data shows that this trend not only continued, it accelerated: every month from August 2020 to January 2021, ... continue reading
MigIE-Edge.gif

All Things Migration from Internet Explorer to Edge Chromium

Brandon Wilson & Tan Tran Hi IT Pros, We still get the questions about Internet Explorer migration to Edge Chromium once in a while, especially from Government Agency Customers, the questions usually related to the in-house legacy application’ compatibility and ... continue reading
Why threat protection is critical to your Zero Trust security strategy

Why threat protection is critical to your Zero Trust security strategy

The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have ... continue reading