Select Page

Infrastructure + Security: Noteworthy News (January, 2019)

Hi there! Stanislav Belov here, and you are reading the next issue of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from ... continue reading
Screenshot of the new Azure portal home page

Azure.Source – Volume 66

Now in preview Azure Monitor logs in Grafana - now in public preview Grafana offers great dashboarding capabilities, rich visualizations, and integrations with over 40 data sources. Grafana integration is now available in preview for Microsoft Azure Monitor logs. This ... continue reading
Image of a Microsoft Data Box Disk

Azure.Source – Volume 65

Now generally available Announcing the general availability of Azure Data Box Disk Azure Data Box Disk, an SSD-based solution for offline data transfer to Azure, is now generally available in the US, EU, Canada, and Australia, with more country/regions to ... continue reading
Create New Rule screenshot

Best practices for alerting on metrics with Azure Database for MariaDB monitoring

On December 4, 2018 Microsoft’s Azure Database for open sources announced the general availability of MariaDB. This blog intends to share some guidance and best practices for alerting on the most commonly monitored metrics for MariaDB. Whether you are a ... continue reading
New features on Azure Database for PostgreSQL

Performance troubleshooting using new Azure Database for PostgreSQL features

At Ignite 2018, Microsoft’s Azure Database for PostgreSQL announced the preview of Query Store (QS), Query Performance Insight (QPI), and Performance Recommendations (PR) to help ease performance troubleshooting, in response to customer feedback. This blog intends to inspire ideas on ... continue reading

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Nations from every corner of the world are increasingly leveraging digital transformation to grow their economies and empower businesses to improve services, including vital services provided by critical infrastructures. This adoption of new information communications technologies (ICT) has unfortunately been ... continue reading
Be careful of data without context: The case of malware scanning of journaled emails

Be careful of data without context: The case of malware scanning of journaled emails

Recently, we shared details on how effectiveness is measured for Office 365 Exchange Online Protection (EOP) and Advanced Threat Protection (ATP). We also followed up with a comprehensive update on Office 365s improved ability to stop phishing emails from impacting ... continue reading

The challenges of adopting a consistent cybersecurity framework in the insurance industry

As hacking events have increased in number and severity, we in the cybersecurity community have united around common strategies that all organizations can implement to reduce their risk. Universal best practices provide organizations with many useful tools to protect their ... continue reading
Access control transition from Azure SQL Database to Azure Key Vault flow chart

Azure.Source – Volume 63

Now in preview Transparent Data Encryption (TDE) with customer managed keys for Managed Instance Announces the public preview of Transparent Data Encryption (TDE) with Bring Your Own Key (BYOK) support for Microsoft Azure SQL Database Managed Instance. Azure SQL Database ... continue reading
Loading...