Select Page
Act fast to secure your infrastructure by moving to TLS 1.2!

Act fast to secure your infrastructure by moving to TLS 1.2!

Protecting sensitive data by putting the right security controls in place is of the utmost importance for every organization. This requires constantly evolving to satisfy standards and regulations that help protect data and combat threats. One of these standards is ... continue reading
John_Barbare_0-1636498280387.png

Fixing Mobile Devices in Non-Compliant Status – MEM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog, I will be focusing on Mobile Devices in Non-Compliance status after applying a Security Update ... continue reading
Three icons representing data at rest, in transit, and in use.

Adopting a Zero Trust approach throughout the lifecycle of data

Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading
Timeline showing dates, threat actor, and malware payload of ransomware attacks by Iranian threat actors

Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021

Over the past year, the Microsoft Threat Intelligence Center (MSTIC) has observed a gradual evolution of the tools, techniques, and procedures employed by malicious network operators based in Iran. At CyberWarCon 2021, MSTIC analysts presented their analysis of these trends ... continue reading
Diagram showing how adaptive protection works

AI-driven adaptive protection against human-operated ransomware

In human-operated ransomware attacks, threat actors use predictable methods to enter a device but eventually rely on hands-on-keyboard activities to move inside a network. To fortify our existing cloud-delivered automated protection against complex attacks like human-operated ransomware, we developed a ... continue reading
John_Barbare_0-1636495244009.png

Application Guard Deployment by MECM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will be focusing on Application Guard and the correct configuration/deployment for Microsoft Endpoint Configuration ... continue reading
Untitled Project (Time 0_02_56;06).png

SMB over QUIC is GA and we have lots of news!

Heya folks, Ned here again. As you might have heard now in all the MS Ignite hullabaloo, Windows Server 2022 Datacenter: Azure Edition is now generally available and that means that SMB over QUIC is now generally available too! I ... continue reading
Autofill your addresses and payment info with Microsoft Authenticator

Autofill your addresses and payment info with Microsoft Authenticator

Howdy Folks, I am excited to announce the general availability of autofill support for your addresses and payment info using Microsoft Authenticator. Just like Microsoft Authenticator automatically fills your passwords (announced February 2021), it can now autofill addresses and payment ... continue reading
Thin volume 4 node.png

SDDC extension update in Windows Admin Center

Create thinly provisioned volumes in Windows Admin Center Thin provisioning is a standout feature exclusive to Azure Stack HCI 21H2 and offers flexible capacity management. With thin provisioning, storage is allocated when needed and volumes can be over-provisioned (size larger ... continue reading
™

Protect your business with Microsoft Security’s comprehensive protection

Securing an organization has never been simple. But over the past year, we’ve seen significant changes in the threat landscape that are having a major impact on organizations of every size in every sector. The frequency and sophistication of cyber ... continue reading