Select Page
Bar graph displaying data sets taken from typical cloud usage including Application Services, IoT Text Files, and System Logs

Hardware innovation for data growth challenges at cloud-scale

The Open Compute Project (OCP) Global Summit 2019 kicks off today in San Jose where a vibrant and growing community is sharing the latest in innovation to make hardware more efficient, flexible, and scalable. For Microsoft, our journey with OCP ... continue reading
ambari_components

Monitoring on Azure HDInsight Part 1: An Overview

Azure HDInsight offers several ways to monitor your Hadoop, Spark, or Kafka clusters. Monitoring on HDInsight can be broken down into three main categories: Cluster health and availability Resource utilization and performance Job status and logs Two main monitoring tools ... continue reading
Azure Stack solution partner logos

Azure Stack IaaS – part 3

This blog post was co-authored by David Armour Principal PM Manager, Azure Stack and Tiberiu Radu, Senior Program Manager, Azure Stack.​ Foundation of Azure Stack IaaS Remember back in the virtualization days when you had to pick a host for ... continue reading

Why the Pipeline Cybersecurity Initiative is a critical step

Its well known by now that pipeline attacks and attacks on utilities of all kinds have been an unfortunately well-trodden path by cyber-adversaries in numerous countries for a few years now. These types of attacks are not theoretical, and the ... continue reading
Screenshot of the new Azure AD Identity Protection Security Overview dashboard.

The evolution of Microsoft Threat Protection, February update

February is an exciting month of enhancements for Microsoft Threat Protection. For those who have followed our monthly updates (November, December, and January), youre aware that Microsoft Threat Protection helps provide users optimal security from the moment they sign in, ... continue reading
Dell EMC Tactical Microsoft Azure Stack in partnership with Tracewell Systems

Advancing tactical edge scenarios with Dell EMC Tactical Microsoft Azure Stack and Azure Data Box family

Today, Microsoft is announcing new intelligent cloud and intelligent edge capabilities for U.S. government customers. These new capabilities will help government customers uniquely address “the tactical edge”—or, a dependence on information systems and connectivity in harsh scenarios or other situations ... continue reading

Defending critical infrastructure is imperative

The Cybersecurity Tech Accords upcoming webinar and the importance of public-private partnership Today, cyberattacks from increasingly sophisticated actors threaten organizations across every sector, and whether a Fortune 500 company or a local bakery, organizations of all sizes need to take ... continue reading
Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

Digital transformation and the transition to a modern workplace encourage employee engagement, productivity, and collaboration. This transition poses major challenges in protecting sensitive information. In the modern workplace, the perimeter between the corporate network and the cloud are fading. Sensitive ... continue reading

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Nations from every corner of the world are increasingly leveraging digital transformation to grow their economies and empower businesses to improve services, including vital services provided by critical infrastructures. This adoption of new information communications technologies (ICT) has unfortunately been ... continue reading

The challenges of adopting a consistent cybersecurity framework in the insurance industry

As hacking events have increased in number and severity, we in the cybersecurity community have united around common strategies that all organizations can implement to reduce their risk. Universal best practices provide organizations with many useful tools to protect their ... continue reading