Select Page
Screenshots of VirusTotal.com showing file properties of original GoldMax malware and the new variant

Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques

Today’s cybersecurity threats continue to find ways to fly and stay under the radar. Cybercriminals use polymorphic malware because a slight change in the binary code or script could allow the said threats to avoid detection by traditional antivirus software ... continue reading
Azure Arc for Developers

Azure Arc for Developers

Azure Arc and the Azure control plane enables developers to build hybrid and mutlicloud architectures for their applications. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build ... continue reading
How MU-MIMO works: measure channel state information, calculate precoding matrix, and apply precoding before transmission.

How cloud computing can improve 5G wireless networks

A great deal has been written about the technologies fueling 5G, especially how those technologies will improve the experience that users have regarding connectivity. Similarly, much has been said about how ongoing developments in technology will usher in a new ... continue reading

How Microsoft Security empowers partners to build customer trust

As I reflect on my first year at Microsoft, it was both challenging and exceptional: from my remote onboarding in the middle of a pandemic to dramatic changes in the cyber landscape, to Microsoft’s critical role as a frontline responder ... continue reading
Azure Arc Overview

Azure Arc for Cloud Solutions Architects

Azure Arc and the Azure control plane enables Cloud Solutions Architects to build hybrid and mutlicloud architectures. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build cloud ... continue reading
™

Preparing for your migration from on-premises SIEM to Azure Sentinel

The pandemic of 2020 has reshaped how we engage in work, education, healthcare, and more, accelerating the widespread adoption of cloud and remote-access solutions. In today’s workplace, the security perimeter extends to the home, airports, the gym—wherever you are. To ... continue reading

Looking to the future for R in Azure SQL and SQL Server

Data science, machine learning, and analytics have re-defined how we look at the world. The R community plays a vital role in that transformation and the R language continues to be the de-facto choice for statistical computing, data analysis, and ... continue reading
Screenshot of command line showing extraction of filesystem from the firmware

Microsoft finds new NETGEAR firmware vulnerabilities that could lead to identity theft and full system compromise

The continuous improvement of security solutions has forced attackers to explore alternative ways to compromise systems. The rising number of firmware attacks and ransomware attacks via VPN devices and other internet-facing systems are examples of attacks initiated outside and below ... continue reading
Retail shop owner working on Microsoft 365 Business Premium a mobile phone and a Surface. Female, retail, artwork, small business

Manage your digital transformation at scale for retail with Cloud Adoption Framework for Azure

Retail organizations are embracing digital transformation and cloud technologies to be more agile and achieve strategic goals. The cloud enables them to drive innovation, make more informed decisions with data analytics, outpace competitors, and deliver products, services, and applications faster ... continue reading

Modernize large-scale NFS workloads and eliminate data silos with Azure Blob Storage

Azure Blob Storage, our object storage platform for storing large-scale data helps customers run their applications using a wide range of protocols. With multi-protocol support, customers can run their applications on a single storage platform with no application rewrites necessary, ... continue reading