Select Page

Designing your cloud strategy to maximize value on Azure

The COVID-19 pandemic continues to be challenging to adjust your business strategies to maintain productive operations and processes. You need new ways to increase efficiencies, optimize costs, and adopt new technologies at a faster rate. Your digital transformation is more ... continue reading
See the breakdown of sign-ins for each Conditional Access condition.

Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity

These past months have changed the way we work in so many ways. When businesses and schools went remote overnight, many of you had to adapt quickly to ensure your users could stay productive while working from home. Bad actors ... continue reading
See the breakdown of sign-ins for each Conditional Access condition.

Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity

These past months have changed the way we work in so many ways. When businesses and schools went remote overnight, many of you had to adapt quickly to ensure your users could stay productive while working from home. Bad actors ... continue reading
The “Create policy” screen in the Azure portal for an Azure AD access package, showing the lifecycle tab in which quarterly reviewing access reviews are required.

Best practices to simplify governing employee access across your applications, groups and teams

In the modern workforce, the emergence of hybrid cloud deployments and collaborative applications make it easy for employees to share information, data, and files with other internal as well as external users, helping them collaborate easily with vendors, business partners, ... continue reading

Azure SQL digital event: Transform your applications with Azure SQL

The impact of COVID-19 has accelerated several trends that already existed in the database world. Overnight, many companies have seen traffic on external and internal applications skyrocket as people adjust to the new normal. The urgency to move from on-premises ... continue reading

Preparing for what’s next: Building landing zones for successful cloud migrations

As businesses look to the cloud to ensure business resiliency and to spur innovation, we continue to see customer migrations to Azure accelerate. Increasingly, we’ve heard from business leaders preparing to migrate that they could learn from our best practices and ... continue reading
An image of Microsoft Secure Score.

Microsoft Security: Use baseline default tools to accelerate your security career

I wrote a series of blogs last year on how gamified learning through cyber ranges can create more realistic and impactful cybersecurity learning experiences and help attract tomorrow’s security workforce. With the global talent shortage in this field, we need ... continue reading
Figure 1: Highest volume netblocks used in STRONTIUM auth attempts.

STRONTIUM: Detecting new patterns in credential harvesting

Microsoft has tied STRONTIUM to a newly uncovered pattern of Office365 credential harvesting activity aimed at US and UK organizations directly involved in political elections. Analysts from Microsoft Threat Intelligence Center (MSTIC) and Microsoft Identity Security have been tracking this ... continue reading
Azure Sentinel roles and allowed actions

Giving Specific Analysts Access to Specific Azure Sentinel Playbooks

Hi, all! Rod Trent here. I am a Cybersecurity CE/Consultant at Microsoft and working with Azure Sentinel. I also blog for our Secure Infrastructure Blog and have quite a few Azure Sentinel articles posted there already.    As a general ... continue reading
readerdashboard.jpg

Sharing Azure Sentinel Workbook Data with Someone Outside the SIEM

Hi, all! Rod Trent here. I am a Cybersecurity CE/Consultant at Microsoft and working with Azure Sentinel. I also blog for our Secure Infrastructure Blog and have quite a few Azure Sentinel articles posted there already.    Customers ask quite ... continue reading