Select Page
Dismantling a fileless campaign: Microsoft Defender ATP next-gen protection exposes Astaroth attack

Dismantling a fileless campaign: Microsoft Defender ATP next-gen protection exposes Astaroth attack

The prevailing perception about fileless threats, among the security industry’s biggest areas of concern today, is that security solutions are helpless against these supposedly invincible threats. Because fileless attacks run the payload directly in memory or leverage legitimate system tools ... continue reading
A graphic showing the system that NextGate's Enterprise Master Patient Index uses to create and mantain patient records.

Solving the problem of duplicate records in healthcare

As the U.S. healthcare system continues to transition away from paper to more a digitized ecosystem, the ability to link all of an individual’s medical data together correctly becomes increasingly challenging. Patients move, marry, divorce, change names and visit multiple ... continue reading
Upgrade Readiness Client Configuration

Upgrade Readiness Client Configuration

First published on TECHNET on Mar 13, 2017Hello, again! I am back and this time, we will look at how to start data collection for the Windows 10 Upgrade Readiness solution. This part assumes that you have a working Operations ... continue reading
Getting Started with Upgrade Readiness

Getting Started with Upgrade Readiness

First published on TECHNET on Mar 03, 2017Hello again. In my last post , I briefly touched upon the challenges application compatibility can present when planning a migration to a new version of Windows. We looked at how Upgrade Readiness ... continue reading
Introduction to Upgrade Readiness and Application Compatibility with Windows 10

Introduction to Upgrade Readiness and Application Compatibility with Windows 10

First published on TECHNET on Feb 24, 2017Hello! My name is Nandan, I am a Premier Field Engineer in the Windows Platforms team with Microsoft UK.With this article, I would like to give you a quick introduction to Upgrade Readiness ... continue reading

Smarter edge, smarter world: Discover the autonomous edge

If you want to solve a business problem using a computer, you have to connect to it. The furthest point at which you can connect the “edge” has always been a major frontier of computing. In the 1950s, the edge ... continue reading
Accelerating smart building solutions with cloud, AI, and IoT

Accelerating smart building solutions with cloud, AI, and IoT

Throughout our Internet of Things (IoT) journey we’ve seen solutions evolve from device-centric models, to spatially-aware solutions that provide real-world context. Last year at Realcomm | IBcon, we announced Azure IoT’s vision for spatial intelligence, diving into scenarios that uniquely ... continue reading
Azure Event Hubs Pipeline

Announcing self-serve experience for Azure Event Hubs Clusters

For businesses today, data is indispensable. Innovative ideas in manufacturing, health care, transportation, and financial industries are often the result of capturing and correlating data from multiple sources. Now more than ever, the ability to reliably ingest and respond to ... continue reading
Demystifying Password Hash Sync

Demystifying Password Hash Sync

This blog is part of a series of posts providing a behind-the-scenes look of Microsoft’s Detection and Response Team (DART). While responding to cybersecurity incidents around the world, DART engages with customers who are wary about using Password Hash Sync ... continue reading
Wipro Titan Secure Reference Architecture using Azure IoT.

Securing the pharmaceutical supply chain with Azure IoT

You’re responsible for overseeing the transportation of a pallet of medicine halfway around the world. Drugs will travel from your pharmaceutical company’s manufacturing outbound warehouse in central New Jersey to third-party logistics firms, distributors, pharmacies, and ultimately, patients. Each box ... continue reading