Select Page
Screen view of security recommendations for network devices and the suggested remediation procedure. Here network device 3 has critical CVEs.

Secure unmanaged devices with Microsoft Defender for Endpoint now

As we have entered into new hybrid work environments, businesses need to think about how they will proactively protect their organizations from the influx of new or “bring your own” (BYO) connected devices. This new normal has exposed the most ... continue reading
Enterprise-scale foundation architecture

Leverage enterprise-scale reference implementations for your cloud adoption

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure In the last couple of blog posts, we followed Tailwind Traders1 on their cloud journey and how the IT team is looking to adopt Azure as part of their ... continue reading
Azure Security Centre Regulatory compliance

Deploy key design principles with enterprise-scale architecture

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on premises and ... continue reading

How to build a successful application security program

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Tanya Janca, Founder of We Hack Purple Academy and ... continue reading
Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. These attacks are now performed by multiple threat actors ranging from financially motivated cybercriminals to state-sponsored groups. To help customers who are not able to immediately ... continue reading
Azure Security Benchmark framework in the Security Center regulatory compliance dashboard

Strengthen and optimize compliance in Azure Security Center

The Regulatory Compliance dashboard in Azure Security Center is an excellent tool for helping organizations understand their compliance posture relative to industry standards. Reporting on compliance with specific standards is obviously critical for regulated customers, though tracking compliance status is ... continue reading
Diagram for delivering a continuum of compute from cloud to edge

Do more for the National Security mission with Azure

As we continue to deliver on our commitment to providing the broadest range of commercial innovation for government, we’re rapidly advancing new capabilities for the National Security mission. Azure helps mission teams gain insight from data—at any security level—anywhere. For ... continue reading

The biggest challenges—and important role—of application security

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Tanya Janca, Founder of We ... continue reading
pbracher_0-1615303062604.png

Microsoft Defender for Endpoint – Red Hat Linux Manual Deployment

Note: This blog is in support of Microsoft Defender for Endpoint (MDE, formerly MDATP) on Red Hat Enterprise Linux (RHEL). Disclaimer: This may not work on all versions of Linux. Linux is a third party entity with its own potential ... continue reading
Security alert of malware hash reputation analysis

Azure Defender for Storage powered by Microsoft threat intelligence

This blog post was co-authored with Roy Levin, Senior Data Scientist With the reality of working from home, more people and devices are now accessing corporate data across home networks. This raises the risks of cyber-attacks and elevates the importance ... continue reading