Select Page
Have you updated your applications to use the Microsoft Authentication Library and Microsoft Graph?

Have you updated your applications to use the Microsoft Authentication Library and Microsoft Graph?

Howdy folks, In 2020, we made a recommendation to developers to use the Microsoft Authentication Library (MSAL) and the Microsoft Graph API when developing applications. Since then, we’ve continued to add capabilities to both MSAL and Microsoft Graph, including improvements ... continue reading

Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19

On February 25, 2020, Microsoft Chief Information Security Officer (CISO) Bret Arsenault was attending the RSA Conference in San Francisco when the city declared a state of emergency because of COVID-19. Shortly after flying back to Seattle, Bret learned of ... continue reading
Immagine1.png

Cloud App Security: block TOR Browser (Anonymous IP)

Hi all, Alan here again with a new article, I’m a Customer Engineer from Italy on Identity and Security. I want to show you how to block TOR browser using Cloud App Security, simple and fast! During the last few ... continue reading
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via phishing and add forwarding rules, enabling these attackers to get access ... continue reading
daribei_5-1622830917040.png

Azure Web App for Containers: Pulling a Container Image from ACR Without Exposing Credentials

Hello dear readers! My name is Daniel Ribeiro and I am a Customer Engineer working with Microsoft Mission Critical Team (SfMC). The Problem A customer of mine recently reported that when deploying a container using the Azure Web App, the ... continue reading
Deep dive: Logging on to Windows

Deep dive: Logging on to Windows

Logging on to your computer is certainly faster than it used to be, yet there are a bunch of technical steps that happen in the background. At our ITOps Talk: All things hybrid event, senior developer Steve Syfuhs took us ... continue reading
magdysalem_0-1622676141054.png

How-To: Deploy Microservice Application with Secrets Store CSI Driver Using Helm Chart

In the last blog we discussed AKS Pod Identity and how we utilize this feature in our application and establish a secure access to Azure resources using Azure SDK libraries. One of disadvantage of using Pod Identity is in case ... continue reading
Variable definitions in the Flow

Use Power Automate to Notify of Upcoming Azure AD App Client Secrets and Certificate Expirations

DisclaimerThe sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability ... continue reading

Understanding the threat landscape and risks of OT environments

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical Manager in ... continue reading
VPN access to Azure from macOS with Azure Active Directory authentication

VPN access to Azure from macOS with Azure Active Directory authentication

Whether you are using Microsoft Azure for development, for production workloads, or for both, it's important to consider the security of the connections to those cloud systems. Virtual private networks are often used to encrypt traffic between a device and ... continue reading