Select Page
KB cluster2

Detect large-scale cryptocurrency mining attack against Kubernetes clusters

Azure Security Center's threat protection enables you to detect and prevent threats across a wide variety of services from Infrastructure as a Service (IaaS) layer to Platform as a Service (PaaS) resources in Azure, such as IoT, App Service, and ... continue reading
Azure Government Secret Collage

Azure Government Secret accredited at DoD IL6, ICD 503 with IaaS and PaaS

Accelerate classified missions with unparalleled connectivity, high availability, and resiliency across three regions with more than 35 services Azure Government Secret recently achieved Provisional Authorization (PA) at Department of Defense Impact Level 6 (IL6) and Intelligence Community Directive (ICD) 503 ... continue reading

Tips to select the best Azure SQL deployment option

When it comes time to migrate your SQL workloads to Azure, you have a choice of two main deployment options: SQL Server on Azure Virtual Machines and Microsoft Azure SQL Database. Each offers its own benefits, so how do you ... continue reading
How to use Azure Data Box for Migrations

How to use Azure Data Box for Migrations

Data is something we all have, at home I have about 2TB of data stored on various hard drives, some of it’s duplicated, some of its backups, some of its super important while the rest is just random stuff I ... continue reading
Az Update: New PowerBI Dashboards for Azure Cost Management and Azure Files with AD

Az Update: New PowerBI Dashboards for Azure Cost Management and Azure Files with AD

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on two exiting things I learned this week. In this update, I want to share a ... continue reading
How to set up Disaster Recovery for Azure IaaS VMs

How to set up Disaster Recovery for Azure IaaS VMs

If you are running virtual machines in Microsoft Azure, and you want to make sure that your servers are protected from downtime, there are multiple things you want to have a look in terms of availability. You will need to ... continue reading
Download Data Protection and Privacy Compliance in the Cloud

10 recommendations for cloud privacy and security with Ponemon research

Today we’re pleased to publish Data Protection and Privacy Compliance in the Cloud: Privacy Concerns Are Not Slowing the Adoption of Cloud Services, but Challenges Remain, original research sponsored by Microsoft and independently conducted by the Ponemon Institute. The report ... continue reading

New Data Exposed episode: Deployment options for Azure SQL Database

Azure SQL Database provides a number of options to optimize your deployment to best fit your needs. In this video we explain the different options and their aspects. More information: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-paas-vs-sql-server-iaas ... continue reading
Determining the public IP address of your CloudShell session

Determining the public IP address of your CloudShell session

CloudShell is a great tool for performing command line work against resources in Azure. One of the challenges around using CloudShell to remotely SSH or use PowerShell Remoting into IaaS VM resources, especially when you have a locked down configuration ... continue reading
Zero Hype

Zero Hype

At Ignite, I had the privilege of presenting “Zero Hype” with my colleagues Nupur Goyal (@nupur_11) who leads our Product Marketing, and Yinon Costica (@c0stica) who directs program management for Azure Security Center, Microsoft Cloud App Security, and Azure ATP ... continue reading