Select Page
Zero Trust framework to enable remote work

Zero Trust framework to enable remote work

Zero Trust Assessment tool now live! With such a large influx of employees working remotely, many of the traditional network-based security controls are unable to protect the organization. For many organizations, there are two options: route all remote traffic through ... continue reading

Zero Downtime Deployments with Azure PaaS

How can I deploy my applications to Azure Platform-as-a-Service (PaaS) like Azure Kubernetes Service (AKS) without having any downtime? How can I automate this, and how can I ensure my customers won't notice changes are happening? In this interview, you ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 3 – Devices

For our second stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Device security. For anyone new joining us on this journey please ensure you check out Part I: Overview and ... continue reading
Azure Advisor: Meet your personalized cloud consultant service

Azure Advisor: Meet your personalized cloud consultant service

Does it feel like you’re always firefighting problems, especially when you talk about cloud services? Did you know that Azure has a FREE service that lets you be proactive to potential issues and pitfalls? It’s called Azure Advisor and this ... continue reading

Azure IoT Introduces seamless integration with Cisco IoT

The pace of technological change is relentless across all markets. Edge computing continues to play an essential role in allowing data to be managed closer to its source, where workloads can range from basic services like data filtering and de-duplication ... continue reading

Microsoft Connected Vehicle Platform: trends and investment areas

This post was co-authored by the extended Azure Mobility Team. The past year has been eventful for a lot of reasons. At Microsoft, we’ve expanded our partnerships, including Volkswagen, LG Electronics, Faurecia, TomTom, and more, and taken the wraps off ... continue reading
clipboard_image_3.png

Autoscaling Azure SQL Hyperscale

Azure SQL Hyperscale is the latest architectural evolution of Azure SQL, that has been natively designed to take advantage of the cloud. One of the main key features of this new architecture is the complete separation of Compute Nodes and ... continue reading
Download Data Protection and Privacy Compliance in the Cloud

10 recommendations for cloud privacy and security with Ponemon research

Today we’re pleased to publish Data Protection and Privacy Compliance in the Cloud: Privacy Concerns Are Not Slowing the Adoption of Cloud Services, but Challenges Remain, original research sponsored by Microsoft and independently conducted by the Ponemon Institute. The report ... continue reading

A novel method in IE11 for dealing with fraudulent digital certificates

First published on TECHNET on Feb 21, 2014Digital certificates are a key mechanism for establishing identity on the Internet. Trust in these certificates is a result of trusting the issuing entity - the Certification Authority (CA). Unfortunately, as a result ... continue reading

How companies can prepare for a heightened threat environment

With high levels of political unrest in various parts of the world, it’s no surprise we’re also in a period of increased cyber threats. In the past, a company’s name, political affiliations, or religious affiliations might push the risk needle ... continue reading