Select Page

Innovations for a more secure U.S. microelectronics supply chain

Keeping up with the rapid pace of technology innovation today requires equal advances in the pace of development of new microelectronics. At the same time, customers are increasingly focused on securing the technology supply chain all the way to the ... continue reading
White text on black background: Azure Synapse and Qlik Data Integration and Power BI Free proof of value for SAP.

Gain real-time insights on SAP ERP data with Azure and Qlik Data Integration

For companies worldwide, SAP is at the core of their business applications—housing critical information on sales, manufacturing, and financial processes. Organizations increasingly need granular, real-time visibility about their business by combining SAP ERP data with other data from their different ... continue reading
Graph showing timeline of the Necurs takedown and the staging and operation of StrangeU and RandomU

What tracking an attacker email infrastructure tells us about persistent cybercriminal operations

From March to December 2020, we tracked segments of a dynamically generated email infrastructure that attackers used to send more than a million emails per month, distributing at least seven distinct malware families in dozens of campaigns using a variety ... continue reading
magdysalem_0-1611613203893.png

Secure Application Lifecycle – Part 3 – Azure Sentinel

In the past part 1 and part 2, I discussed how we can monitor the security and health of our subscription manually. Also, we used Microsoft tools to find security issues with the subscription and discussed how we could resolve ... continue reading
Zero Trust Principles

Using Zero Trust principles to protect against sophisticated attacks like Solorigate

The Solorigate supply chain attack has captured the focus of the world over the last month. This attack was simultaneously sophisticated and ordinary. The actor demonstrated sophistication in the breadth of tactics used to penetrate, expand across, and persist in ... continue reading
Azure Sentinel Analytics menu

Azure Sentinel: Using rule templates

Microsoft's Azure Sentinel, our Security Incident and Event Management (SIEM) solution, enables you to connect activity data from different sources into a shared workspace. That data ingestion is just the first step in the process though. The power comes from ... continue reading
Diagram of solution overview for the just-in-time inventory.

4 common analytics scenarios to build business agility

Azure Synapse Analytics is a limitless analytics service that is designed to bring the two worlds of big data and data warehousing into a unified, enterprise-grade, powerful platform. In this blog post, we look at four real-world use cases where ... continue reading

MLflow with Azure Machine Learning

We'll walk through the concepts and features of MLflow support in Azure Machine Learning. We'll be showing a few examples on how to manage your machine learning assets using MLflow in variety of workflows including GitHub Actions. Jump To: [01:00] ... continue reading
Protecting Microsoft 365 from on-premises attacks

Protecting Microsoft 365 from on-premises attacks

Many customers connect their private corporate networks to Microsoft 365 to benefit their users, devices, and applications. However, there are many well-documented ways these private networks can be compromised. As we have seen in recent events related to the SolarWinds ... continue reading

Collaborative innovation on display in Microsoft’s insider risk management strategy

The disrupted work environment, in which enterprises were forced to find new ways to enable their workforce to work remotely, changed the landscape for operations as well as security. One of the top areas of concern is effectively managing insider ... continue reading