Select Page
A diagram showing the Microsoft Cloud App Security and its integration with CSAB solutions

A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security

Today’s business uses an average of 1,180 cloud apps¹, with many of those organizations securing their apps through cloud access security brokers (CASB). The organizational need for a CASB has grown alongside the use of cloud apps to enable remote ... continue reading
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
Bhavna_Appayya_0-1614748281431.png

Secure your Infrastructure Monitoring with SCOM

Recent high profile cyberattacks have highlighted the importance of having strong standards and features built into infrastructure monitoring and management tools. Microsoft System Center Operations Manager (SCOM) offers world class monitoring capabilities and includes powerful built-in security features. Our increased ... continue reading

Securing and governing data in a new hybrid work reality

The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading

Decentralized digital identities and blockchain: The future as we see it

First published on February 12, 2018 Howdy folks, I hope you’ll find today’s post as interesting as I do. It’s a bit of brain candy and outlines an exciting vision for the future of digital identities. Over the last 12 ... continue reading

What’s new with SQL Server Big Data Clusters

SQL Server Big Data Clusters (BDC) is a new capability brought to market as part of the SQL Server 2019 release. BDC extends SQL Server's analytical capabilities beyond in-database processing of transactional and analytical workloads by uniting the SQL engine ... continue reading

Back up Linux virtual machines running mission-critical workloads

As organizations continue to embrace Linux, we see a growing number of enterprises running business and mission-critical workloads on Linux virtual machines in Azure. Azure Backup service offers application consistent backup of Linux virtual machines in Azure to safeguard against ... continue reading
An infographic that shows the flow of context-aware discovery based on machine learning.

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading

Modernizing your network security strategy

From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. Some of these challenges we can’t change. However, I’m pleased about the ones we can, and are changing across the cybersecurity landscape ... continue reading
OPS104: Securing SMB from within and without

OPS104: Securing SMB from within and without

In this session, Ned Pyle discusses how widely the SMB protocol is used on Windows, Windows Server and in Microsoft Azure. Learn specific strategies to secure it from lateral movement and interception attacks. Speaker: Ned Pyle, Principal Program Manager This ... continue reading