Select Page

How purple teams can embrace hacker culture to improve security

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Matthew Hickey, co-founder, CEO, and writer for Hacker ... continue reading
Resources for accelerating your Zero Trust journey

Resources for accelerating your Zero Trust journey

For many organizations, 2020 was the year that finally saw remote work become a reality on a global scale. As many people begin transitioning back to the office, many organizations are thinking about how they can transition from a remote ... continue reading
Map of threat research methodologies.

SimuLand: Understand adversary tradecraft and improve detection strategies

At Microsoft, we continuously collaborate with customers and the InfoSec community to learn more about the latest adversary tradecraft so that we can improve our detection strategies across all our security services. Even though those detections are already built into ... continue reading
Step-By-Step: Migrating Active Directory Certificate Service From Windows Server 2008 R2 to 2019

Step-By-Step: Migrating Active Directory Certificate Service From Windows Server 2008 R2 to 2019

Windows Server 2008 R2 achieved end of support via Microsoft on January 14th 2020. In a previous post, steps were detailed on Active Directory Certificate Service migration from 2008 R2 to 2019 but required the new Windows Server 2019 server ... continue reading
Azure Health Bot symptom checker offers multilingual support

Azure Health Bot adds eight new regions with additional language support, including India to support pandemic response

Azure Health Bot empowers developers in healthcare organizations to build and deploy artificial intelligence (AI)-powered, compliant, conversational healthcare experiences at scale. It combines built-in medical intelligence with natural language capabilities to understand clinical terminology and can be easily customized to ... continue reading
Graphic depicting the technical characteristics of IoT and their unique challenges. Characteristics include running automated workloads, aging infrastructure, and limited connectivity.

How to apply a Zero Trust approach to your IoT solutions

For many, 2020 was a year of survival as they rapidly transformed their businesses in response to a new normal. From enabling new remote and hybrid work models to implementing new technology to help optimize operations, the last year has ... continue reading

Step-by-Step: Configure and manage Microsoft Universal Print

Guest post by Microsoft Customer Engineer, Daniele De Angelis. It's a pleasure to be here again on the . Recently I had the opportunity to try the Microsoft Universal Print, the new cloud printing service on Azure. Today I ... continue reading
The shared responsibility model for cloud security. As cloud service provider takes responsibility for controls, the cloud customer can use their resources to focus on the controls for which they remain responsible.

Meet critical infrastructure security compliance requirements with Microsoft 365

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Every operator of an industrial control system also operates an IT network to service its productivity needs. A supervisory control and data acquisition (SCADA) system operator ... continue reading
Azure Unblogged - Azure Arc Jumpstart Project

Azure Unblogged – Azure Arc Jumpstart Project

In this episode of Azure Unblogged, @thomasmaurer speaks with @liorkamrat about the Azure Arc Jumpstart project. The Azure Arc Jumpstart project is designed to provide a "zero to hero" experience so you can start working with Azure Arc right away!With ... continue reading

Importance of Browser Updates and Browser Based Security Controls

Introduction   This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. It has been a while since I have had time to sit down and write a security blog due to studying and making sure I ... continue reading