Select Page
1.png

Protect and Secure Cloud-based Applications using Azure MFA

Introduction In this article, we're going to talk about enabling MFA for applications that are accessed over the internet. This will force users accessing the application from the internet to authenticate with their primary credentials as well as a secondary ... continue reading
Are You Ready for Cloud Only?

Are You Ready for Cloud Only?

Recently I was approached by a customer on concerns and possibilities around going from on-premises to hybrid to cloud only. The customer had successfully gone through the hybrid scenario and was able to remove all known dependencies with their on-premises ... continue reading

PowerShell Basics: How to check if MFA is enabled in Azure and Office 365

Security governance has been top of mind for most since the onslaught of human malware has the masses working from home. This comes with new concerns surrounding identity protection and actually proving that remote users are who they say they ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading

Native Commands in PowerShell – A New Approach

In this two part blog post I’m going to investigate how PowerShell can take better advantage of native executables. In the first post, I’m going to discuss a few of the ways that PowerShell can better incorporate native executables into ... continue reading
SQL Server logo

Apache Spark Connector for SQL Server and Azure SQL is now open source

Accelerating big data analytics with the Spark connector for SQL ServerWe’re happy to announce that we have open–sourced the Apache Spark Connector for SQL Server and Azure SQL on GitHub. Born out of Microsoft's SQL Server Big Data Clusters investments, ... continue reading

Update your applications to use Microsoft Authentication Library and Microsoft Graph API

Howdy folks, Microsoft Build 2020 allowed us to engage deeply with our developer community, and we are continuing to improve how developers can easily use identity features in their applications. To help developers take advantage of all the identity features ... continue reading
Add Customized Images for Video in Teams and the Added Security

Add Customized Images for Video in Teams and the Added Security

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this guide and tutorial, I will walk you through the steps of changing you background and adding ... continue reading
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

The increasing pervasiveness of cloud services in today’s work environments, accelerated by a crisis that forced companies around the globe to shift to remote work, is significantly changing how defenders must monitor and protect organizations. Corporate data is spread across ... continue reading

Minimize disruption with cost-effective backup and disaster recovery solutions on Azure

A top of mind concern among our customers is keeping their applications and data workloads running and recoverable in the case of unforeseen events or disasters. For example, COVID-19 has presented daunting challenges for IT, which are only compounded by ... continue reading