Select Page

Developing connected security solutions

Many organizations deploy dozens of security products and services from Microsoft and others to combat increasing cyberthreats. As a result, the ability to quickly extract value from these solutions has become more challenging. This creates opportunity for developers to build ... continue reading
Azure Security Center alert on a file downloaded and executed.

Azure Security Center exposes crypto miner campaign

Azure Security Center discovered a new cryptocurrency mining operation on Azure customer resources. This operation takes advantage of an old version of known open source CMS, with a known RCE vulnerability (CVE-2018-7600) as the entry point, and then after using ... continue reading

How Azure Security Center helps you protect your environment from new vulnerabilities

Recently the disclosure of a vulnerability (CVE-2019-5736) was announced in the open-source software (OSS) container runtime, runc. This vulnerability can allow an attacker to gain root-level code execution on a host. Runc is the underlying container runtime underneath many popular ... continue reading
A new tab of containers is now available in Azure Security Center

Protect Linux containers running in IaaS with Azure Security Center

Nowadays, more and more enterprises are migrating their monolith applications to run mission-critical, containerized cloud-native applications in production. Containers provide multiple advantages, both for developers and IT professionals. They are easy and fast to deploy, immutable, and provide fast iteration ... continue reading
Windows Defender Antivirus can now run in a sandbox

Windows Defender Antivirus can now run in a sandbox

Windows Defender Antivirus has hit a new milestone: the built-in antivirus capabilities on Windows can now run within a sandbox. With this new development, Windows Defender Antivirus becomes the first complete antivirus solution to have this capability and continues to ... continue reading

What is built-in intelligence in Azure SQL Database?

Azure SQL Database is a fully managed latest stable version of SQL Server Database Engine hosted in Azure cloud that has several built-in features that protect and manage your data. These features may autonomously perform various maintenance tasks instead of ... continue reading
Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization ... continue reading
#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM

#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM

Azure Security Center Standard includes: Hybrid security – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security ... continue reading
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help ... continue reading
Securing the modern workplace with Microsoft 365 threat protection – part 3

Securing the modern workplace with Microsoft 365 threat protection – part 3

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Detecting ransomware in the modern workplace Over the last two weeks, we have shared with you the roots of Microsoft 365 threat protection and how Microsoft ... continue reading