Select Page
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Hello everyone, I’m Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I’d like to share some insights for securing PowerShell credentials using certificates. This post is based on a recent customer project, but we’ll also wrap ... continue reading
Image of a Microsoft Data Box Disk

Azure.Source – Volume 65

Now generally available Announcing the general availability of Azure Data Box Disk Azure Data Box Disk, an SSD-based solution for offline data transfer to Azure, is now generally available in the US, EU, Canada, and Australia, with more country/regions to ... continue reading
Achieving compliant data residency and security with azure

Questions on data residency and compliance in Microsoft Azure? We got answers!

Questions about the security of and control over customer data, and where it resides, are on the minds of cloud customers today. We’re hearing you, and in response, we published a whitepaper that gives clear answers and guidance into the ... continue reading
Access control transition from Azure SQL Database to Azure Key Vault flow chart

Azure.Source – Volume 63

Now in preview Transparent Data Encryption (TDE) with customer managed keys for Managed Instance Announces the public preview of Transparent Data Encryption (TDE) with Bring Your Own Key (BYOK) support for Microsoft Azure SQL Database Managed Instance. Azure SQL Database ... continue reading

Anatomy of a secured MCU

Secure silicon Azure Sphere is an end-to-end solution containing three complementary components that provide a secured IoT platform. They include an Azure Sphere microcontroller unit (MCU), an operating system optimized for IoT scenarios that is managed by Microsoft, and a ... continue reading
Screenshot of Device Restrictions policy and setting

Windows Defender ATP has protections for USB and removable devices

Meet Jimmy. Jimmy is an employee in your company. He Does Things With Computers (official title). Last Wednesday, as Jimmy got out of his car after parking in the company-owned parking lot, he saw something on the ground. That something ... continue reading
Zero Trust part 1: Identity and access management

Zero Trust part 1: Identity and access management

Once in a while, a simple phrase captures our imagination, expressing a great way to think about a problem. Zero Trust is such a phrase. Today, Ill define Zero Trust and then discuss the first step to enabling a Zero ... continue reading
Confidential computing using Always Encrypted with secure enclaves in SQL Server 2019 preview

Confidential computing using Always Encrypted with secure enclaves in SQL Server 2019 preview

SQL Server 2019 preview brings encryption technology to a broader set of scenarios by enabling rich confidential computing capabilities with the enhanced Always Encrypted feature, Always Encrypted with secure enclaves. Always Encrypted with secure enclaves allows rich computations on encrypted ... continue reading

A fintech startup pivots to Azure Cosmos DB

The right technology choices can accelerate success for a cloud born business. This is true for the fintech start-up clearTREND Research. Their solution architecture team knew one of the most important decisions would be the database decision between SQL or ... continue reading
Loading...