Select Page

Azure Blob Storage enhancing data protection and recovery capabilities

Enterprises, partners, and IT professionals store business-critical data in Azure Blob Storage. We are committed to providing the best-in-class data protection and recovery capabilities to keep your applications running. Today, we are announcing the general availability of Geo-Zone-Redundant Storage (GZRS)—providing ... continue reading
Diagram showing the steps for the STAMINA approach: pre-processing, transfer learning, and evaluation

Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification

The opportunities for innovative approaches to threat detection through deep learning, a category of algorithms within the larger framework of machine learning, are vast. Microsoft Threat Protection today uses multiple deep learning-based classifiers that detect advanced threats, for example, evasive ... continue reading

Azure HPC Cache – File caching for high-performance computing (HPC)

Scott Jeschonek joins Scott Hanselman to talk about Azure HPC Cache. Whether you are rendering a movie scene, searching for variants in a genome, or running machine learning against a data set, HPC Cache can provide very low latency high ... continue reading
MTP detection coverage across the attack kill-chain stages, with block opportunities.

Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation

The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29. When looking at protection results out of the box, without ... continue reading
Data governance matters now more than ever

Data governance matters now more than ever

Knowing, protecting, and governing your organizational data is critical to adhere to regulations and meet security and privacy needs. Arguably, that’s never been truer than it is today as we face these unprecedented health and economic circumstances. To help organizations ... continue reading
diagram showing different attack stages and techniques in each stage that various ransomware groups use

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

At a time when remote work is becoming universal and the strain on SecOps, especially in healthcare and critical industries, has never been higher, ransomware actors are unrelenting, continuing their normal operations. Multiple ransomware groups that have been accumulating access ... continue reading

DevOps with Logz.io

Abel Wang is joined by Asaf Yigal to discuss streamline observability with Logz.io's open source-based Cloud Observability platform. See how the platform unifies the best breed open source monitoring tools (Kibana, Grafana, and Jaeger) on a single pane of glass ... continue reading

Open sourcing the Java language extension for SQL Server

With over 20 years of existence, Java is still one of the most popular programming languages and is used in many enterprise applications.In SQL Server 2019, we added a Java language extension, which enables secure execution of Java programs in ... continue reading
Histogram showing the distribution of valuation times for traditional models.

Azure GPUs with Riskfuel’s technology offer 20 million times faster valuation of derivatives

Exchange-traded financial products—like stocks, treasuries, and currencies—have had the benefit of a tremendous wave of technological innovation in the past 20 years, resulting in more efficient markets, lower transaction costs, and greater transparency to investors. However, large parts of the ... continue reading
Azure Table 1

NERC CIP Compliance in Azure vs. Azure Government cloud

As discussed in my last blog post on North American Electric Reliability Corporation—Critical Infrastructure Protection (NERC CIP) Compliance in Azure, U.S. and Canadian utilities are now free to benefit from cloud computing in Azure for many NERC CIP workloads. Machine ... continue reading