Protect SQL Server 2014 workloads with Azure flexibility
SQL Server has brought reliability and security to mission-critical workloads for 30 years. SQL Server 2022, released November 2022, delivers performance enhancements as well as Azure connectivity for disaster recovery, analytics, and governance. Now customers like Mediterranean Shipping Company (MSC) ... continue reading
Azure Firewall Tips from the Field
Introduction Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. In this post, I will provide some tips and clarifications about Azure Firewall based on my experience from the field. Topics The following are the ... continue reading
Azure AD Rename Rollout and Resources
The rename of Azure Active Directory (Azure AD) to Microsoft Entra ID is now rolling across content and product experiences from Microsoft, as per the implementation timeline outlined in the Azure AD rename announcement on July 11th. We expect ... continue reading
Important: Update to deviceRegistrationPolicy Resource Type for MS Graph Beta API Version
We have an important update to provide on MS Graph Device Registration Policy resource type currently in preview and available in beta API version. We are making some changes to resource type properties that introduce breaking changes. These changes are ... continue reading

Flax Typhoon using legitimate software to quietly access Taiwanese organizations
Summary Microsoft has identified a nation-state activity group tracked as Flax Typhoon, based in China, that is targeting dozens of organizations in Taiwan with the likely intention of performing espionage. Flax Typhoon gains and maintains long-term access to Taiwanese organizations’ ... continue reading
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things
The recently published United States National Cybersecurity Strategy warns that many popular Internet of Things (IoT) devices are not sufficiently secure to protect against many of today’s common cybersecurity threats.1 The strategy also cautions that many of these IoT devices ... continue reading

Microsoft AI Red Team building future of safer AI
An essential part of shipping software securely is red teaming. It broadly refers to the practice of emulating real-world adversaries and their tools, tactics, and procedures to identify risks, uncover blind spots, validate assumptions, and improve the overall security posture ... continue reading
Desired State Configuration (DSC) Planning Update
Desired State Configuration (DSC) Planning Update – August 2023 Hey DSC enthusiasts! We’re bursting with excitement to share new information about the plans for Desired State Configuration (DSC). First off, we’d like to extend a massive thank you to our ... continue reading
Azure Landing Zone Accelerator for AVS – Network Virtual Appliance in Azure Virtual Network
Options for network connectivity with AVS There are many options for network connectivity when it comes to Azure VMware Solution. This post reviews utilizing an NVA to inspect all AVS traffic. Network Architecture This scenario is ideal if: You need ... continue reading

Cyber Signals: Sporting events and venues draw cyberthreats at increasing rates
Today we released the fifth edition of Cyber Signals, spotlighting threats to large venues, and sporting and entertainment events, based on our learnings and telemetry from delivering cybersecurity support to critical infrastructure facilities during the State of Qatar’s hosting of ... continue reading