Select Page
The next frontier in machine learning 1

The next frontier in machine learning: driving responsible practices

Organizations around the world are gearing up for a future powered by artificial intelligence (AI). From supply chain systems to genomics, and from predictive maintenance to autonomous systems, every aspect of the transformation is making use of AI. This raises ... continue reading
We can see that this image runs an XMRIG miner:

Misconfigured Kubeflow workloads are a security risk

Azure Security Center (ASC) monitors and defends thousands of Kubernetes clusters running on top of AKS. Azure Security Center regularly searches for and research for new attack vectors against Kubernetes workloads. We recently published a blog post about a large ... continue reading
Enhanced notebook editor inside Azure Machine Learning studio with three users and IntelliSense.

Azure Machine Learning—what’s new from Build 2020

Machine learning (ML) is gaining momentum across a number of industries and scenarios as enterprises look to drive innovation, increase efficiency, and reduce costs. Microsoft Azure Machine Learning empowers developers and data scientists with enterprise-grade capabilities to accelerate the ML ... continue reading

Build support for open source in your organization

Have you ever stared at the same lines of code for hours only to have a coworker identify a bug after just a quick glance? That’s the power of community! Open source software development is guided by the philosophy that ... continue reading
Protect your customer accounts with passwordless mobile authentication

Protect your customer accounts with passwordless mobile authentication

Hello! In today’s ‘Voice of the ISV’ story, Jim Small and Milan Radojkovic at IPification describe how IPification mobile authentication and Azure Active Directory (Azure AD) B2C deliver improved security and a better user experience to our mutual customers. Don’t ... continue reading

Developing applications for secure remote work with Azure AD

In light of the current COVID-19 outbreak, we have been working closely with our customers to help them address the new reality. As such, we recently published tips to help IT admins to enable secure, remote access. Today, we want ... continue reading
Building the Totally Network Isolated Root Certification Authority

Building the Totally Network Isolated Root Certification Authority

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately I have done quite a few Public Key Infrastructure (PKI) migrations for customers mostly because their certification authorities ... continue reading
Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. In this post, I am going to show you how to use a minimal set of Group Policy objects ... continue reading
Setting up TPM protected certificates using a Microsoft Certificate Authority - Part 2: Virtual Smart Cards

Setting up TPM protected certificates using a Microsoft Certificate Authority – Part 2: Virtual Smart Cards

First published on TECHNET on Jul 15, 2014 Hey Everyone, I am back with part 2 of this 3 part series on TPM protected certificates. The topics covered in this are related to Virtual Smart Cards, their benefits, and lastly ... continue reading
Setting up TPM protected certificates using a Microsoft Certificate Authority - Part 1: Microsoft Platform Crypto Provider

Setting up TPM protected certificates using a Microsoft Certificate Authority – Part 1: Microsoft Platform Crypto Provider

First published on TECHNET on Jun 05, 2014Hey Everyone, This is Wes Hammond with Premier Field Engineering back to share what I have learned about protecting digital certificates using the Trusted Platform module in Windows desktops, laptops and servers. This ... continue reading