Select Page

Enable government missions in the cloud with Azure Government

Steve Michelotti joins Scott Hanselman to show what's new in Azure Government, which provides a physically separate and network-isolated instance of Azure for U.S. federal, state, and local governments in multiple regions in the United States. Learn how Azure Government ... continue reading

Combat attacks with security solutions from Trustwave and Microsoft

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In 2021, cyberattacks and instances of ransomware demands against companies, agencies, and institutions have dominated the headlines. These kinds of attacks are on the rise ... continue reading
Microsoft's recommended mitigation prioritizations: prepare, limit, and prevent.

3 steps to prevent and recover from ransomware

On July 14, 2021, the National Cybersecurity Center of Excellence1 (NCCoE) at the National Institute of Standards and Technology2 (NIST) hosted a virtual workshop3 to seek feedback from government and industry experts on practical approaches to preventing and recovering from ... continue reading
Image demonstrating process to start utilizing Valimail Authenticate.

Get free DMARC visibility with Valimail Authenticate and Microsoft Office 365

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Phishing and email spoofing not only erode brand trust but also leave recipients vulnerable to financial loss and serious invasions of privacy. These tactics have ... continue reading
Azure Arc - enabled data services in disconnected mode

Azure Arc – enabled data services in disconnected mode

Last time I had the chance to talk with Travis Wright (Principal Group Engineering Manager at Microsoft) about getting an overview of the end-to-end experience for deploying Azure Arc—enabled data services in connected mode, but what about scenarios where you ... continue reading
The five levels of CMMC.

How to prepare for CMMC compliance as a defense industrial base supplier using the Microsoft cloud

In 2020, the US Department of Defense (DoD) began the phased rollout of a new framework for protecting their supply chain, known as the defense industrial base (DIB). This new Cybersecurity Maturity Model Certification1 (CMMC) system requires regular audits that ... continue reading
Attack flow for Mozi botnet.

How to proactively defend against Mozi IoT botnet

Mozi is a peer-to-peer (P2P) botnet that uses a BitTorrent-like network to infect IoT devices such as network gateways and digital video records (DVRs). It works by exploiting weak telnet passwords1 and nearly a dozen unpatched IoT vulnerabilities2 and it’s ... continue reading
Number of DDoS attacks

Azure DDoS Protection—2021 Q1 and Q2 DDoS attack trends

This blog post was co-authored by Amir Dahan, Senior Program Manager, Anupam Vij, Principal Program Manager, Skye Zhu, Data and Applied Scientist 2, and Syed Pasha, Principal Network Engineer, Azure Networking. In our 2020 retrospective, we highlighted shifts in the ... continue reading
Azure Arc—enabled data services in connected mode

Azure Arc—enabled data services in connected mode

I had the chance to talk with Travis Wright (Principal Group Engineering Manager at Microsoft) about getting an overview of the end-to-end experience for deploying Azure Arc—enabled data services in connected mode. In this video, you will learn how to ... continue reading
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

The Microsoft Threat Intelligence Center (MSTIC) alongside the Microsoft Security Response Center (MSRC) has uncovered a private-sector offensive actor, or PSOA, that we are calling SOURGUM in possession of now-patched, Windows 0-day exploits (CVE-2021-31979 and CVE-2021-33771). Private-sector offensive actors are ... continue reading