Select Page
Diagram for delivering a continuum of compute from cloud to edge

Do more for the National Security mission with Azure

As we continue to deliver on our commitment to providing the broadest range of commercial innovation for government, we’re rapidly advancing new capabilities for the National Security mission. Azure helps mission teams gain insight from data—at any security level—anywhere. For ... continue reading
march.png

Register for Microsoft Plugfest 33

(guest post from Amrit Shandilya from the Microsoft File System Minifilter Team) Hello! We are excited to announce that Plugfest 33 has been scheduled! In light of global health concerns due to novel coronavirus (COVID-19), Plugfest is going virtual for ... continue reading
Azure global network

Architect and optimize your internet traffic with Azure routing preference

At Microsoft, we see our customers going through rapid digital transformation to accelerate business growth and empower their employees. And the shift to the digital sphere means a phenomenal growth in internet traffic. The global pandemic has transformed the way ... continue reading
mbam.gif

MBAM Server Migration To Microsoft Endpoint Manager

Dear IT Pros, Today we discuss about MBAM's Bitlocker data migration to MEM Microsoft provides a range of flexible BitLocker management alternatives to meet organization’s needs, as follows: Cloud-based BitLocker management using Microsoft Endpoint Manager. On-premises BitLocker management using System ... continue reading
22.png

10 Reasons to Love Passwordless #10: Never use a password

In this series, Microsoft identity team members share their reasons for loving passwordless authentication (and why you should too!). Pamela Dingle closes the series with a post about the tighter security of passwordless authentication. Here we are at the last ... continue reading
USB2.jpg

MEM – All Things About USB Drive Management and Troubleshooting

Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading
A diagram showing the Microsoft Cloud App Security and its integration with CSAB solutions

A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security

Today’s business uses an average of 1,180 cloud apps¹, with many of those organizations securing their apps through cloud access security brokers (CASB). The organizational need for a CASB has grown alongside the use of cloud apps to enable remote ... continue reading
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
Bhavna_Appayya_0-1614748281431.png

Secure your Infrastructure Monitoring with SCOM

Recent high profile cyberattacks have highlighted the importance of having strong standards and features built into infrastructure monitoring and management tools. Microsoft System Center Operations Manager (SCOM) offers world class monitoring capabilities and includes powerful built-in security features. Our increased ... continue reading

Securing and governing data in a new hybrid work reality

The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading