Select Page

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 3 – Devices

For our second stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Device security. For anyone new joining us on this journey please ensure you check out Part I: Overview and ... continue reading
PowerPoint slide depicting an example of a recommended slide layout, adding icons that correspond to each animal in the list.

How Azure Machine Learning enables PowerPoint Designer

If you use Office 365, you have likely seen the Microsoft PowerPoint Designer appear to offer helpful ideas when you insert a picture into a PowerPoint slide. You may also have found it under the Home tab in the ribbon ... continue reading
skissel_0-1584993340479.png

Azure DSC for Zero Trust Windows 10 Devices Managed by Intune

Introduction Zero Trust is defined by Microsoft as model that “assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to ... continue reading
How to Implement Center for Internet Security (CIS) recommendations for Azure

How to Implement Center for Internet Security (CIS) recommendations for Azure

In the big wide world of security, it can be hard to know what Azure resource settings give you the best possible security posture. Organisations like the USA-based National Institute of Standards and Technology and the Center for Internet Security ... continue reading

Data agility and open standards in health: FHIR fueling interoperability in Azure

Data agility in healthcare; it sounds fantastic, but there are few data ecosystems as sophisticated and complex as healthcare. The path to data agility can often be elusive. Leaders in health are prioritizing and demanding cloud technology that works on ... continue reading
Azure IoT Central Continuous Patient Monitoring App Template Reference Architecture

Reimagining healthcare with Azure IoT

Providers, payors, pharmaceuticals, and life sciences companies are leading the next wave of healthcare innovation by utilizing connected devices. From continuous patient monitoring, to optimizing operations for manufacturers and cold-chain supply tracking for the pharmaceutical industry, the healthcare industry has ... continue reading

IoT Signals healthcare report: Key opportunities to unlock IoT’s promise

The cost of healthcare is rising globally and to tackle this, medical providers, from hospitals to your local doctor’s office, are looking to IoT to streamline processes and minimize costs. Few industries stand to gain more from emerging technology. And ... continue reading
Az Update: New PowerBI Dashboards for Azure Cost Management and Azure Files with AD

Az Update: New PowerBI Dashboards for Azure Cost Management and Azure Files with AD

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on two exiting things I learned this week. In this update, I want to share a ... continue reading
Az Update: Cloud Shell running PS7 and Scopes for ARM Templates

Az Update: Cloud Shell running PS7 and Scopes for ARM Templates

With all the changes in Azure, it is sometimes hard to keep track, that why I thought I will give you a quick update on two exiting things I learned this week. I will show you that Azure Cloud Shell ... continue reading
What is a strong key protection in Windows?

What is a strong key protection in Windows?

First published on TECHNET on Jun 16, 2009 Strong key protection is one of the most misunderstood features in Windows security. In this post I will attempt to demystify it. I will also try to address some of the misconceptions ... continue reading