Select Page

Securing and governing data in a new hybrid work reality

The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading
Top 5 things to get the most out of Microsoft Ignite

Top 5 things to get the most out of Microsoft Ignite

We’re one day away from the kick off of Microsoft Ignite digital experience taking place March 2nd-4th starting at 8am PST. I thought it would be a good idea to share some special insights on how to get the most ... continue reading
Automating quota management with Quota API.

Automating quota management with Azure Quota REST API

Enterprises are increasingly defined by the applications they use and build to run their core business processes, including the customer experiences they provide. Across all sectors, we see how companies like challenger banks, online healthcare providers, e-commerce providers, and other ... continue reading
Real people. IT professionals build and maintain the LinkedIn server farm which operates on 100% renewable energy. Power is hydro-generated and managed efficiently on-site with minimum new draw from external grid. State-of-the-art facility uses eco-friendly solutions such as using reclaimed water to cool the data center.

Securing Azure datacenters with continuous IoT/OT monitoring

As more intelligent devices and machinery become connected to the internet, Operational Technology (OT) and the Internet of Things (IoT) have become part of your enterprise network infrastructure—and a growing security risk. With every new factory sensor, wind turbine monitoring ... continue reading
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

Turning the page on Solorigate and opening the next chapter for the security community

The recent Solar Winds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted ... continue reading
Diagram distinguishing between events, alerts and incidents

6 strategies to reduce cybersecurity alert fatigue in your SOC

Today, organizations are faced with the increasingly difficult task of trying to protect their expanding digital estate from sophisticated cybersecurity threats. Migration to the cloud and a mobile workforce has dissolved the network boundary and projected the digital estate beyond ... continue reading
Lists the six values Microsoft brings to operators with the Azure for Operators initiative

Future-proof your network with Azure for Operators

Increasing competition and ever-growing demand for mobile, always-on services challenges operators to find new strategies to grow profits and gain a competitive edge. To succeed, operators also need to embrace three critical trends: Changing the economics of their service model ... continue reading
Video screenshot of graphical user interface.

Icertis boosts performance over 80 percent and lowers costs on Azure SQL

As customers grow their mission critical workloads, scaling up to manage spiky workloads in house can become an expensive proposition. Icertis, a leading provider of contract lifecycle management in the cloud, had one such workload managing over 7.5 million contracts ... continue reading
An infographic that shows the flow of context-aware discovery based on machine learning.

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading