Select Page
Now that you have a plan, it’s time to start deploying

Now that you have a plan, it’s time to start deploying

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization ... continue reading
First things first: Envisioning your security deployment

First things first: Envisioning your security deployment

This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your ... continue reading

How Azure SQL Database makes database management easier?

Azure SQL database is a platform as a service SQL Server Database Engine hosted in Azure cloud and managed by Azure. Azure automates many management activities and enables you to focus on development and optimizations. In addition, it enables you ... continue reading

Working towards a more diverse future in security

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past ... continue reading
Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Hi, Michele Ferrari here from the Premier Field Engineer-Identity Team in San Francisco here today to do some mix and match about multiple technologies we have within the Azure space. This is the question we’re going to answer today: How ... continue reading

Move away from passwords, deploy Windows Hello. Today!

Something we understood from the very beginning with Windows Hello for Business is our customers would approach Windows 10 in a series of phases. The first phase is to simply deploy the platform itself. From there, additional phases would follow ... continue reading
Microsoft’s perspective on cyber resilience

Microsoft’s perspective on cyber resilience

This post is authored by Ann Johnson, Vice President, Enterprise Cybersecurity Group. In the wake of recent ransomware outbreaks, I wanted to understand how impacted firms have evolved their thinking on cyber resilience planning and implementation. I asked the Detection ... continue reading
Three basic security hygiene tips from Microsoft’s Identity Team

Three basic security hygiene tips from Microsoft’s Identity Team

This post is authored by Alex Weinert from the Identity Division’s Security and Protection Team. Hey there! I want to share three basic hygiene tips for account protection that every organization should consider. Applying these will go a long way ... continue reading
Identity and Rights Management in CSP model – Part 2

Identity and Rights Management in CSP model – Part 2

The CSP program is currently rolling out at scale and many service providers are embarking on the journey to provide management infrastructure services for their customers. In addition to the first article about Identity in CSP, we will show more ... continue reading

Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, ... continue reading