
Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats
In part three of this blog series on aligning security with business objectives and risk, we explored what it takes for security leaders to shift from looking at their mission as purely defending against technical attacks, to one that focuses ... continue reading
How-To: Deploy Microservice Application with Pod Identity Using Helm Chart
In the last blog we discussed how to deploy AKS fully integrated with AAD. Also we discussed deploying add-on for Azure Pod Identity and Azure CSI driver. In the article we will discuss how to create an application that using ... continue reading
HOW-TO: Deploy AKS with POD Managed Identity and CSI using Terraform and Azure Pipeline
Today as we develop and run application in AKS, we do not want credentials like database connection strings, keys, or secrets and certificates exposed to the outside world where an attacker could take advantage of those secrets for malicious purposes ... continue reading
Create Your Own Custom Endpoint Administration Console Using Microsoft Power Apps
I've heard a bit of interest expressed recently in the ability to create a customizable Endpoint Configuration Manager (SCCM/ConfigMgr) console that could either be pruned down or featured up in a way to customize it to fit the specific needs ... continue reading

More performance and choice with new Azure HBv3 virtual machines for HPC
HPC-optimized virtual machines featuring AMD EPYC 7003-series processors Today Azure advances the velocity at which we bring the latest technologies to our HPC customers and the compute performance we put at their fingertips. We are excited to announce Azure HBv3-series ... continue reading
MEM – All Things About USB Drive Management and Troubleshooting
Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading
Quick Tip: Does my NIC support VMMQ?
Hi Folks - Most often, when a virtual machine or container is receiving network traffic, the traffic passes through the virtualization stack in the host. This requires host (parent partition) CPU cycles. Synthetic Data Path If the amount of traffic ... continue reading
Importance of Browser Updates and Browser Based Security Controls
Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. It has been a while since I have had time to sit down and write a security blog due to studying and making sure I ... continue reading

ZINC attacks against security researchers
In recent months, Microsoft has detected cyberattacks targeting security researchers by an actor we track as ZINC. The campaign originally came to our attention after Microsoft Defender for Endpoint detected an attack in progress. Observed targeting includes pen testers, private ... continue reading
New Surface PCs enable virtualization-based security (VBS) by default to empower customers to do more, securely
VBS and HVCI-enabled devices help protect from advanced attacks Escalation of privilege attacks are a malicious actor’s best friend, and they often target sensitive information stored in memory. These kinds of attacks can turn a minor user mode compromise into ... continue reading