Select Page

PowerShell and OpenSSH team investments for 2022

It’s time to discuss the team investments for 2022. For some areas we’ll be completing work we’ve already started, and in others we’ll be beginning on new projects. Executive Order on Cybersecurity One of the areas we’ve already spent significant ... continue reading
Azure AD: Change Management Simplified

Azure AD: Change Management Simplified

Hello Everyone, Rapid change is a growing reality in cloud services. In Azure AD alone, we are making hundreds of changes every year including new feature releases, changes to existing features, as well as deprecations and retirements. We’ve heard from ... continue reading
A preview of table designer and its accompanying features

Introducing new and improved updates to SQL tools on Azure

In this post, we'll recap the updates to SQL tools over the past few months, including the recent releases of Azure Data Studio and SQL Server Management Studio (SSMS). Additionally, we'll highlight the Data-Tier Application Framework (DacFx) 160 general availability ... continue reading
Extend the reach of Azure AD Identity Protection into workload identities

Extend the reach of Azure AD Identity Protection into workload identities

We are delighted to announce the public preview for Azure AD Identity Protection for workload identities! This work comes from working with our customers as we apply all we’ve learned from protecting user accounts to workload identities, especially in the ... continue reading
Organize packages and update groups in Configuration Manager TP 2202

Organize packages and update groups in Configuration Manager TP 2202

Update 2202 for the Technical Preview Branch of Microsoft Endpoint Configuration Manager has been released. In this release, Admins will be able to organize packages and update groups in a much better way using folders. This feature helps to enable ... continue reading
Diagram showing an example of a Uniswap flow

‘Ice phishing’ on the blockchain

The technologies that connect us are continually advancing, and while this brings tremendous new capabilities to users, it also opens new attack surfaces for adversaries and abusers. Social engineering represents a class of threats that has extended to virtually every ... continue reading

How to Find Azure Resources with Public IP Addresses

Overview Creating Resources in Azure is so simple for IT teams these days but finding all the public endpoints that could be visible to the internet can be challenging. Why do I need to understand which IP's are exposed to ... continue reading
Architecture diagram for Galaxy on Azure using Azure CycleCloud with grid engine cluster.

Genomic analysis on Galaxy using Azure CycleCloud

Cloud computing and digital transformation have been powerful enablers for genomics. Genomics is expected to be an exabase-scale big data domain by 2025, posing data acquisition and storage challenges on par with other major generators of big data. Embracing digital ... continue reading

Private AKS and ACR Using Private Endpoint – Part 2/2

Introduction The objective of this tutorial is to create a private environment for AKS, ACR and a JumpBox VM. AKS and ACR will be accessible only through Private Endpoint. As of part 1, our VM did connect securely through Private ... continue reading
Screenshot of phishing email used in by ACTINIUM

ACTINIUM targets Ukrainian organizations

The Microsoft Threat Intelligence Center (MSTIC) is sharing information on a threat group named ACTINIUM, which has been operational for almost a decade and has consistently pursued access to organizations in Ukraine or entities related to Ukrainian affairs. MSTIC previously ... continue reading