Select Page
Figure 1

How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure Functions

Summary One of the top 10 Azure consuming companies has multiple country government-mandated requirements to block egress to and ingress from IP addresses and IP address ranges on a dynamic embargoed/sanctioned IP list. In other words, various country governments across ... continue reading
Introducing Attribute Based Access Control (ABAC) in Azure

Introducing Attribute Based Access Control (ABAC) in Azure

The public preview of Attribute Based Access Control (ABAC) in Azure builds on Azure Role-Based Access Control (RBAC) to make it easier for organizations to manage access to Azure resources at scale. This first release of ABAC supports Azure Storage ... continue reading
Upload Files to Azure Blob Storage using Power Automate Desktop

Upload Files to Azure Blob Storage using Power Automate Desktop

In this blog post, we are going to have a look at how you can automatically upload files to an Azure Blob storage account using Power Automate Desktop. Power Automate Desktop is a great tool to build automation on your ... continue reading

Why wait? SaaS-delivered data management for the pace of change

It's incredible to think how much can change in a year. The past year has seen unprecedented digital transformation, with 90 percent of companies reporting cloud usage higher than planned over the past year, according to the Flexera 2021 State ... continue reading
foo.png

Discover cloud storage solutions at Azure Storage Day on April 29, 2021

Guest post from the Azure Storage team We are excited to announce Azure Storage Day, a free digital event on April 29, 2021, where you can explore cloud storage solutions for all your enterprise workloads. Join us to: Understand cloud ... continue reading
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
Security alert of malware hash reputation analysis

Azure Defender for Storage powered by Microsoft threat intelligence

This blog post was co-authored with Roy Levin, Senior Data Scientist With the reality of working from home, more people and devices are now accessing corporate data across home networks. This raises the risks of cyber-attacks and elevates the importance ... continue reading
Example showing Case 1: Custom Script Extension

Azure LoLBins: Protecting against the dual use of virtual machine extensions

Azure Defender for Resource Manager offers unique protection by automatically monitoring the resource management operations in your organization, whether they’re performed through the Azure portal, Azure REST APIs, Azure CLI, or other Azure programmatic clients. In this blog, we will ... continue reading
Create automation task for an Azure resource

Manage your Azure resources using automation tasks

There are different ways to manage your Azure resources depending on your specific needs. With automation tasks, Azure offers a simple way to manage a specific resource or resource group using automation task templates. These templates depend on the Azure ... continue reading
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading