Select Page
Example of a detected SQL injection attack alert in Microsoft Defender for Cloud

Stay on top of database threats with Microsoft Defender for Azure Cosmos DB

Databases are constantly evolving to handle new use cases, incorporate more intelligence, and store more data, giving developers and organizations a wide range of database types to meet their varying needs. Because aspects including architecture, capabilities, configuration options, and authentication ... continue reading
WhoIAM: Enabling inclusive security through identity protection and fraud prevention

WhoIAM: Enabling inclusive security through identity protection and fraud prevention

Greetings, This is Sue Bohn, Director of Program Management for Identity and Access Management. In this Voice of the Partner blog post, we’ve invited Ajith Alexander, Head of Product Management at WhoIAM, a leading identity and access management (IAM) company, ... continue reading
Create automation task for an Azure resource

Manage your Azure resources using automation tasks

There are different ways to manage your Azure resources depending on your specific needs. With automation tasks, Azure offers a simple way to manage a specific resource or resource group using automation task templates. These templates depend on the Azure ... continue reading
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

Azure Availability Zones in the South Central US datacenter region add resiliency

As businesses move more workstreams to the cloud, business continuity and data protection have never been more critical—and perhaps their importance has never been more visible than during the challenges and unpredictability of 2020. To continue our commitment to supporting ... continue reading
magdysalem_0-1611108265970.png

Secure Application Lifecycle – Part 2- Secure DevOps Kit for Azure (AzSK)

In my previous blog I addressed the issue of managing credentials in the code and presented two different alternatives to secure it. In this post, I will focus on Azure subscription security health and its challenge. I could summarize the ... continue reading
mark_serafine_0-1610111977713.png

Introduction to Microsoft Azure Government Secret

Disclaimer: The purpose of this article is only to call attention to Microsoft’s new cloud service (Azure Government Secret), highlight its public features/services, and provide general guidance for those Microsoft customers who are eligible to use these new services. For ... continue reading
Diagram of a high-level view of the global Azure.com architecture.

How Azure.com operates on Azure part 2: Technology and architecture

When you’re the company that builds the cloud platforms used by millions of people, your own cloud content needs be served up fast. Azure.com—a complex, cloud-based application that serves millions of people every day—is built entirely from Azure components and ... continue reading

Cost optimization strategies for cloud-native application development

Today, we’ll explore some strategies that you can leverage on Azure to optimize your cloud-native application development process using Azure Kubernetes Service (AKS) and managed databases, such as Azure Cosmos DB and Azure Database for PostgreSQL. Optimize compute resources with ... continue reading
 Diagram showing that Azure is the platform that underpins Teams Services and Office 365 Core Service

Advancing Microsoft Teams on Azure—operating at pandemic scale

“The COVID-19 pandemic has reset what it means to work, study, and socialize. Like many of us, I have come to rely on Microsoft Teams as my connection to my colleagues. In this post, our friends from the Microsoft Teams ... continue reading