Select Page
s1.png

Software Installation Using Azure Policy State Change Events

Azure Policy can give us the ability to audit settings inside a virtual machine using Guest Configuration. However, at this time we can’t remediate those machines because the feature is not yet available. This means that although we can see ... continue reading
™

Improve your threat detection and response with Microsoft and Wortell

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA. The way of working is changing rapidly. Many workloads are moving to the cloud and the pandemic accelerated organizations to provide infrastructure to aid ... continue reading
Am I billed for an Azure Virtual Machine if it's shut down?

Am I billed for an Azure Virtual Machine if it's shut down?

Come to the cloud, it has consumption-based billing! But what does that mean, exactly? Is my virtual machine free if it is shut down? Let's explore the billing components of an Azure Virtual Machine. Resources in Azure all have particular ... continue reading
Image that shows the different layers of Azure private MEC

Unlocking the enterprise opportunity with 5G, edge compute, and cloud

The power of 5G, IoT, and real-time AI will unlock new and innovative services for enterprises across the world to accelerate their transformation toward Industry 4.0 as they evolve and adopt diverse new business models. The partnerships created by operators, ... continue reading
Figure 1

How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure Functions

Summary One of the top 10 Azure consuming companies has multiple country government-mandated requirements to block egress to and ingress from IP addresses and IP address ranges on a dynamic embargoed/sanctioned IP list. In other words, various country governments across ... continue reading
A pie chart from S A P insider benchmark report. Survey finds that Azure remains the primary platform respondents look at when deploying S A P S 4 hana at 47 percent. A W S is preferred at 18 percent, Google Cloud is preferred at 21 percent, and other is preferred at 14 percent.

Why customers, including SAP, choose Azure for their SAP solutions

For over three years, I have had the privilege of leading the SAP solutions on Azure business at Microsoft and of partnering with outstanding leaders at SAP and with many of our global partners to ensure that our joint customers ... continue reading
The Azure Firewall solution as displayed in Azure Sentinel portal UI in the solution section.

Optimize security with Azure Firewall solution for Azure Sentinel

Security is a constant balance between proactive and reactive defenses. They are both equally important, and neither can be neglected. Effectively protecting your organization means constantly optimizing both prevention and detection. That’s why we’re excited to announce a seamless integration ... continue reading

Understanding the threat landscape and risks of OT environments

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical Manager in ... continue reading
Visual chart depicting the four stages of the life cycle of an incident: Before, during, and after an incident and the lessons learned.

Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats

In part three of this blog series on aligning security with business objectives and risk, we explored what it takes for security leaders to shift from looking at their mission as purely defending against technical attacks, to one that focuses ... continue reading
Automation in Azure Backup for management-at-scale

Automation in Azure Backup for management-at-scale

As you manage your operations in Azure, your backup estate might expand by including new diverse set of workloads or scale-up in volume. At small-scale, actions such as identifying the right machines to be backed up, configuring backup, monitoring their ... continue reading