Securing and governing data in a new hybrid work reality
The past year has led to an evolution in not only how we think about work, but more importantly, where work gets done. Arguably, gone are the days that your organization’s data is limited to the protected confines of your ... continue reading

Top 5 things to get the most out of Microsoft Ignite
We’re one day away from the kick off of Microsoft Ignite digital experience taking place March 2nd-4th starting at 8am PST. I thought it would be a good idea to share some special insights on how to get the most ... continue reading

Automating quota management with Azure Quota REST API
Enterprises are increasingly defined by the applications they use and build to run their core business processes, including the customer experiences they provide. Across all sectors, we see how companies like challenger banks, online healthcare providers, e-commerce providers, and other ... continue reading

Securing Azure datacenters with continuous IoT/OT monitoring
As more intelligent devices and machinery become connected to the internet, Operational Technology (OT) and the Internet of Things (IoT) have become part of your enterprise network infrastructure—and a growing security risk. With every new factory sensor, wind turbine monitoring ... continue reading
What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?
It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading
Turning the page on Solorigate and opening the next chapter for the security community
The recent Solar Winds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted ... continue reading

6 strategies to reduce cybersecurity alert fatigue in your SOC
Today, organizations are faced with the increasingly difficult task of trying to protect their expanding digital estate from sophisticated cybersecurity threats. Migration to the cloud and a mobile workforce has dissolved the network boundary and projected the digital estate beyond ... continue reading

Future-proof your network with Azure for Operators
Increasing competition and ever-growing demand for mobile, always-on services challenges operators to find new strategies to grow profits and gain a competitive edge. To succeed, operators also need to embrace three critical trends: Changing the economics of their service model ... continue reading

Icertis boosts performance over 80 percent and lowers costs on Azure SQL
As customers grow their mission critical workloads, scaling up to manage spiky workloads in house can become an expensive proposition. Icertis, a leading provider of contract lifecycle management in the cloud, had one such workload managing over 7.5 million contracts ... continue reading

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading