Select Page
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
Leveraging PowerShell SecretManagement to generalize a demo environment

Leveraging PowerShell SecretManagement to generalize a demo environment

Hello Folks, I’ve been working with some colleagues on a shared demo environment, and one issue came up during a session with customers that highlighted a problem. If any of us change the local admin password of the servers or ... continue reading
What I Wish I Knew: Manufacturing leaders offer firsthand IoT adoption advice

What I Wish I Knew: Manufacturing leaders offer firsthand IoT adoption advice

The manufacturing industry’s digital transformation is accelerating as companies increase their use of Internet of Things (IoT) technology to improve efficiency and address common factory challenges. But even if your company makes high-tech products and has a sizable IT team, ... continue reading
Measure-Script image

Optimizing your $Profile

Optimizing your $Profile Your PowerShell Profile allows you to customize your PowerShell session and runs at startup. Complex profiles can cause a significant delay in the startup of PowerShell as it is a script that needs to be executed before ... continue reading
Enterprise-scale foundation architecture

Leverage enterprise-scale reference implementations for your cloud adoption

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure In the last couple of blog posts, we followed Tailwind Traders1 on their cloud journey and how the IT team is looking to adopt Azure as part of their ... continue reading
Azure Security Centre Regulatory compliance

Deploy key design principles with enterprise-scale architecture

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on premises and ... continue reading
New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks targeting areas of computing that don’t have the protection of the cloud. New data shows that firmware attacks are on the rise, and businesses aren’t ... continue reading
Enterprise-Scale with hub and spoke architecture

Scale cloud adoption with modular designs for enterprise-scale landing zones

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on-premises and is ... continue reading
Azure Security Benchmark framework in the Security Center regulatory compliance dashboard

Strengthen and optimize compliance in Azure Security Center

The Regulatory Compliance dashboard in Azure Security Center is an excellent tool for helping organizations understand their compliance posture relative to industry standards. Reporting on compliance with specific standards is obviously critical for regulated customers, though tracking compliance status is ... continue reading

5 reasons Databricks runs best on Azure

For any organization running big data workloads in the cloud, exceptional scale, performance, and optimization are essential. Databricks customers have multiple choices for their cloud destination. Azure Databricks is the only first-party service offering for Databricks, which provides customers with ... continue reading