Select Page

Join us at NAFEMS World Congress to learn more about Azure HPC and AI Supercomputing

Design and deployment of high-performance computing (HPC) infrastructure is often constrained by physical resources, internal know-how, and policies. That can be a challenge in the current era of new hardware architectures, programming paradigms, and constantly changing simulation software. The cloud ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading
Presenting Hardware Isolation of Microsoft Edge and Microsoft Office products. Workflow being displayed at the bottom with Device Hardware being the focal point, flowing through Kernel, into the Windows platform before reaching Microsoft Office, Microsoft Edge, and Apps.

Defend against zero-day exploits with Microsoft Defender Application Guard

Zero-day security vulnerabilities—known to hackers, but unknown to software creators, security researchers, and the public—are like gold to attackers. With zero-days, or even zero-hours, developers have no time to patch the code, giving hackers enough access and time to explore ... continue reading
Graphic outlines DART’s containment steps, which cover assessing the scope of the situation and preserving existing systems.

A guide to combatting human-operated ransomware: Part 2

This blog is part two of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our human-operated ransomware docs page ... continue reading
Azure Arc - enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

Azure Arc – enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

In this video, I had the chance to speak with Dhananjay Mahajan @dhanMMS (Principal Program Manager at Microsoft) about how you can run Azure Arc enabled data services on Azure Stack HCI with Azure Kubernetes Service (AKS). This provides you ... continue reading

Move SQL Server licenses without Software Assurance to Azure

Migrating your on-premises infrastructure and architecture to the cloud may seem like a daunting task, especially if you don't have Software Assurance for your on-premises licenses. While this may seem difficult and challenging, there is a pain-free way to bring ... continue reading
Network diagram of private mobile network leveraging hyperscale cloud

Optimize your private mobile network and accelerate innovation with hyperscale cloud

The power of 5G: faster speeds, lower latencies, improved cost efficiencies, rich capabilities The evolution of 5G has empowered enterprise organizations to do more. With the support of high-speed, high-bandwidth connections, and low-latency computing, these enterprises have been enabled to ... continue reading
Deep Dive: Windows hybrid join single-sign-on to Azure Active Directory

Deep Dive: Windows hybrid join single-sign-on to Azure Active Directory

In a previous article, we explored the process of logging on to Windows and authenticating with an on-premises Active Directory domain, against a Windows Server domain controller. Many organizations are now using both on-premises and cloud resources, and users want ... continue reading
CNO-DNN.png

Failover Clustering in Azure

Azure is a cloud computing platform with an ever-expanding set of services to help you build solutions to meet your business goals. Azure services range from simple web services for hosting your business presence in the cloud to running fully ... continue reading
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

The Microsoft Threat Intelligence Center (MSTIC) alongside the Microsoft Security Response Center (MSRC) has uncovered a private-sector offensive actor, or PSOA, that we are calling SOURGUM in possession of now-patched, Windows 0-day exploits (CVE-2021-31979 and CVE-2021-33771). Private-sector offensive actors are ... continue reading