Select Page
:smile:

Azure Monitor: Audit your Azure and non-Azure SQL Server

Hi everyone, time passed since my last post. Hope you missed me Today I am going to cover an interesting aspect on how to capture security audit events from both Azure and non-Azure SQL Server machines. Most of you probably ... continue reading
Hero image

Accelerate the in-vehicle digital experience with Azure Cognitive Services

Microsoft is helping to reshape the automotive industry in the way it serves its drivers with in-vehicle infotainment systems. As an example, Azure is partnering with XPeng to enable AI voice experiences for automotive brands and customers. The solution provides ... continue reading
Azure Security product name changes – Microsoft Ignite November 2021

Azure Security product name changes – Microsoft Ignite November 2021

Do you remember that on release in Feb 2010, Azure was known as Windows Azure? It took four years before it was renamed to Microsoft Azure, to more accurately reflect that it wasn’t just for Windows workloads. This November, some ... continue reading

A simpler, more integrated approach to data governance

It’s no secret that the volume of data created by organizations and people multiplies daily. And, in the digital—and hybrid work—world we live in, that data is spread across more tools, platforms, devices, and clouds than ever before, creating regulatory ... continue reading

How to build a privacy program the right way

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with attorney Whitney Merrill, ... continue reading
Business email compromise campaign targets wide range of orgs with gift card scam

Business email compromise campaign targets wide range of orgs with gift card scam

Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to ... continue reading
An infographic that shows the flow of context-aware discovery based on machine learning.

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of customer or employee personal information, they must report it within the required time frame. The size and scope ... continue reading
Azure Security Center / Azure Defender

Microsoft Secure Score Across the Microsoft Security Stack

Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will walk you through various Microsoft products from the Microsoft Security Stack and explain ... continue reading
Protect your customer accounts with passwordless mobile authentication

Protect your customer accounts with passwordless mobile authentication

Hello! In today’s ‘Voice of the ISV’ story, Jim Small and Milan Radojkovic at IPification describe how IPification mobile authentication and Azure Active Directory (Azure AD) B2C deliver improved security and a better user experience to our mutual customers. Don’t ... continue reading