Select Page
6-1.png

10 Reasons to Love Passwordless #6: The Passwordless Funnel

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Today, Tarek Dawoud, principal program manager, continues this series. Since we announced our Public Preview of passwordless credential management, we have ... continue reading
Cloud cost structure provides flexibility.

Demystifying cloud economics

Migrating to the cloud is an evolution, and it's important to think differently about how you consume resources. As you're building a business case in your organization, it's critical to step back and understand the cloud's key constructs and transform ... continue reading
diagram showing commonalities and differences between for-profit ransomware and espionage campaigns

Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective

In part two of this blog series on aligning security with business objectives and risk, we explored the importance of thinking and acting holistically, using the example of human-operated ransomware, which threatens every organization in every industry. As we exited ... continue reading
Real people. IT professionals build and maintain the LinkedIn server farm which operates on 100% renewable energy. Power is hydro-generated and managed efficiently on-site with minimum new draw from external grid. State-of-the-art facility uses eco-friendly solutions such as using reclaimed water to cool the data center.

Securing Azure datacenters with continuous IoT/OT monitoring

As more intelligent devices and machinery become connected to the internet, Operational Technology (OT) and the Internet of Things (IoT) have become part of your enterprise network infrastructure—and a growing security risk. With every new factory sensor, wind turbine monitoring ... continue reading

Turning the page on Solorigate and opening the next chapter for the security community

The recent Solar Winds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted ... continue reading
MDE1.jpg

MDE Antivirus Configuration Common Mistakes and Best Practice

_______________________________________________________ John Barbare and Tan Tran Dear IT Pros, We discuss about Microsoft Defender for Endpoint Antivirus Configuration, Policy and exclusion list in detail to avoid making the common mistakes and to apply the best practice to it. Best Practices ... continue reading

A playbook for modernizing security operations

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post from our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks ... continue reading
Figure 1. Sample of an Azure Defender alert raised in response to a Dangle DNS record has been detected.

Azure Defender for App Service introduces dangling DNS protection

Resources hosted on Azure App Service are at the forefront as attackers are constantly on the lookout for vulnerabilities in web applications. Dormant domains are a permanent resident on the checklist of both opportunistic and target-oriented attackers. To reduce potential ... continue reading

Operational best practices for web apps on Azure App Service

Azure App Service hosts millions of apps, serves trillions of requests per day, and has an SLA of 99.95%. But what should you do when your app has issues in production? Byron Tardif joins Scott Hanselman to discuss some operational ... continue reading

Sophisticated cybersecurity threats demand collaborative, global response

Microsoft’s response to Solorigate Since December, the United States, its government, and other critical institutions including security firms have been addressing the world’s latest serious nation-state cyberattack, sometimes referred to as ‘Solorigate’ or ‘SUNBURST.’ As we shared earlier this is ... continue reading