Select Page

Parsing JSON with PowerShell

Q: I try to parse my JSON with the handy dandy “ConvertFrom-JSON” cmdlet but it only works in PowerShell 7, not in my good old PowerShell 5.1. How do I get it to work everywhere? A: PS 7 parses JSON ... continue reading
Table showing differences between phishing kits and phishing-as-a-service

Catching the big fish: Analyzing a large-scale phishing-as-a-service operation

In researching phishing attacks, we came across a campaign that used a rather high volume of newly created and unique subdomains—over 300,000 in a single run. This investigation led us down a rabbit hole as we unearthed one of the ... continue reading

Enable industrial device connectivity with thousands of partner-provided Azure IoT Plug and Play device profiles

Simplifying industrial IoT device connectivity has been top of mind for many of us at Microsoft. Recently we dramatically expanded our ability to support faster operational technology (OT) to cloud connectivity for up to 80 percent of all industrial equipment ... continue reading
wernerrall_0-1628084204317.png

Azure & Desired State Configuration Part 4/4

Index Part 1 : Focus on Desired State Configuration in PowerShell Part 2 : Focus on Deploying with DevOps Pipeline Part 3 : Focus on Azure Automation Account Part 4 : Focus on DSC in Automation Account Scenario Until now ... continue reading
Accelerate transformation of Spring Boot applications with Azure and Dynatrace

Monitor Spring Boot applications end-to-end using Dynatrace

Today, we are announcing the integration of the Dynatrace Software Intelligence Platform in Azure Spring Cloud. Over the past 18 months, we worked with many enterprise customers to learn about the scenarios they face. Many of these customers have thousands ... continue reading

DevOps Lab | Infra as Code in Action: Naming conventions | Ep 1 of 4-episode series

The DevOps Lab is back with host April Edwards. On the show today, April welcomes Christopher Maneu for Episode one of this four-part series, Infra as Code in Action! DevOps practitioners get a practical example of how to implement naming ... continue reading
wernerrall_0-1628078667380.png

Azure & Desired State Configuration Part 2/4

Scenario In Part 1 Azure & Desired State Configuration Part 1/4 - Microsoft Tech Community we saw how we could deploy a web server on a new VM in using a Desired State Configuration file and the Azure Portal. Now ... continue reading
Cloud Katana design principles.

Automating security assessments using Cloud Katana

Today, we are open sourcing Cloud Katana, a cloud-native serverless application built on the top of Azure Functions to assess security controls in the cloud and hybrid cloud environments. We are currently covering only use cases in Azure, but we ... continue reading
Trend-spotting email techniques: How modern phishing emails hide in plain sight

Trend-spotting email techniques: How modern phishing emails hide in plain sight

With the massive volume of emails sent each day, coupled with the many methods that attackers use to blend in, identifying the unusual and malicious is more challenging than ever. An obscure Unicode character in a few emails is innocuous ... continue reading

Migrating content from traditional SIEMs to Azure Sentinel

In part two of this three-part series, we covered the five types of side-by-side security information and event management (SIEM) configurations commonly used during a long-term migration to Microsoft Azure Sentinel. For part three, we’ll be looking at best practices ... continue reading