Select Page

How to cost-effectively manage and secure a mobile ecosystem

Today’s post was written by Roxane Suau, Vice President of Marketing for Pradeo. In the corporate environment, mobile devices and applications are at the center of communications, enhancing collaborators’ productivity with 24/7 access to information. But at the same time, ... continue reading
Pa$$word1.png

Your Pa$$word doesn’t matter

Every week I have at least one conversation with a security decision maker explaining why a lot of the hyperbole about passwords – “never use a password that has ever been seen in a breach,” “use really long passwords”, “passphrases-will-save-us”, ... continue reading
Hyperscale video thumbnail with small play button

Thanks for 10 years and welcome to a new chapter in SQL innovation

Tomorrow, July 9, 2019, marks the end of extended support for SQL Server 2008 and 2008 R2. These releases transformed the database industry, with all the core components of a database platform built-in at a fraction of the cost of ... continue reading

Customers get unmatched security with Windows Server and SQL Server workloads in Azure

Customers such as Allscripts, Chevron, J.B. Hunt, and thousands of others are migrating their important workloads to Azure where they find unmatched security. While understanding cloud security is initially a concern to many, after digging in, customers often tell us ... continue reading

Customers get unmatched security with Windows Server and SQL Server workloads in Azure

Customers such as Allscripts, Chevron, J.B. Hunt, and thousands of others are migrating their important workloads to Azure where they find unmatched security. While understanding cloud security is initially a concern to many, after digging in, customers often tell us ... continue reading

Developing connected security solutions

Many organizations deploy dozens of security products and services from Microsoft and others to combat increasing cyberthreats. As a result, the ability to quickly extract value from these solutions has become more challenging. This creates opportunity for developers to build ... continue reading
Azure Security Center alert on a file downloaded and executed.

Azure Security Center exposes crypto miner campaign

Azure Security Center discovered a new cryptocurrency mining operation on Azure customer resources. This operation takes advantage of an old version of known open source CMS, with a known RCE vulnerability (CVE-2018-7600) as the entry point, and then after using ... continue reading

How Azure Security Center helps you protect your environment from new vulnerabilities

Recently the disclosure of a vulnerability (CVE-2019-5736) was announced in the open-source software (OSS) container runtime, runc. This vulnerability can allow an attacker to gain root-level code execution on a host. Runc is the underlying container runtime underneath many popular ... continue reading
A new tab of containers is now available in Azure Security Center

Protect Linux containers running in IaaS with Azure Security Center

Nowadays, more and more enterprises are migrating their monolith applications to run mission-critical, containerized cloud-native applications in production. Containers provide multiple advantages, both for developers and IT professionals. They are easy and fast to deploy, immutable, and provide fast iteration ... continue reading
Windows Defender Antivirus can now run in a sandbox

Windows Defender Antivirus can now run in a sandbox

Windows Defender Antivirus has hit a new milestone: the built-in antivirus capabilities on Windows can now run within a sandbox. With this new development, Windows Defender Antivirus becomes the first complete antivirus solution to have this capability and continues to ... continue reading