Select Page
An image of a GADOLINIUM controlled Microsoft TechNet profile established in 2016.

Microsoft Security—detecting empires in the cloud

Microsoft consistently tracks the most advanced threat actors and evolving attack techniques. We use these findings to harden our products and platform and share them with the security community to help defenders everywhere better protect the planet. Recently, the Microsoft ... continue reading

Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training

Everyone knows about phishing scams, and most of us think we’re too smart to take the bait. Our confidence often reaches superhero levels when we’re logged onto a company network. As Chief Security Advisor for Microsoft, and previously at telco ... continue reading
F&S_Radar

Better outcomes with AI: Frost & Sullivan names Microsoft the leading AI platform for healthcare IT

In early 2020, Frost & Sullivan recognized Microsoft as the “undisputed leader” in global Artificial Intelligence (AI) platforms for the Healthcare IT (HCIT) sector on the Frost Radar™. In a field of more than 200 global industry participants, Frost & ... continue reading
Archutecture.JPG

Durham County enhances security across a hybrid environment with Azure AD and F5 BIG-IP APM

Hello! In today’s “Voice of the Customer” blog, Lyvon Garth, CISO, Durham County, Aaron Stone, Assistant Director and members of his team provide details about how they use Azure Active Directory (Azure AD) and F5 BIG-IP APM to apply consistent ... continue reading
Advanced Settings

Microsoft Defender ATP: Remediate Apps Using MEM

  Introduction   This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will walk you through the steps of navigating through the Microsoft Defender Advanced Threat Protection (ATP) portal to see ... continue reading
A graph showing the trend of COVID-19 themed attacks.

5 cybersecurity paradigm shifts that will lead to more inclusive digital experiences

Whether responding to a natural disaster, defending against a cyberattack, or meeting the unprecedented demands to enable the largest workforce in history to work remotely, we amplify our human capacity through technology. At Microsoft, cybersecurity is the underpinning to helping ... continue reading
Microsoft Endpoint Manager - Creating a WDAV Policy

Microsoft Endpoint Manager – Creating a WDAV Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating a Windows Defender Antivirus (WDAV) policy ... continue reading
Azure Arc enabled SQL Server is now available

Az Update: Azure Arc enabled SQL, Azure File Sync Private Endpoints, and IoT Digital Twin updates

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

With the dawn of the COVID-19 pandemic, state and federal agencies around the globe were looking at ways to modernize data intake for social services recipients. The government of a country of about 40 million citizens reached out to Microsoft ... continue reading
Azure Pricing calulator.

Azure.com operates on Azure part 1: Design principles and best practices

Azure puts powerful cloud computing tools into the hands of creative people around the world. So, when your website is the face of that brand, you better use what you build, and it better be good. As in, 99.99-percent composite ... continue reading