Select Page
Enterprise-scale foundation architecture

Leverage enterprise-scale reference implementations for your cloud adoption

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure In the last couple of blog posts, we followed Tailwind Traders1 on their cloud journey and how the IT team is looking to adopt Azure as part of their ... continue reading
Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. These attacks are now performed by multiple threat actors ranging from financially motivated cybercriminals to state-sponsored groups. To help customers who are not able to immediately ... continue reading
Infographic showing Secure VPN connections to on-premises resources using Blue Cedar

Blue Cedar partners with Microsoft to combat BYOD issues

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.    Bring Your Own Device (BYOD) has been a divisive topic within corporations for years. Employees wanted the convenience of working on their own smart ... continue reading
Azure Virtual Networks add dialog

Configuring Azure virtual network subnets with CIDR notation

For people new to networking, creating Azure Virtual Network subnets can be tricky. Learn how CIDR notation works to segment ranges of IP addresses. When you create an Azure virtual network, you'll get default IP addresses that look something like ... continue reading
mark_serafine_0-1610111977713.png

Introduction to Microsoft Azure Government Secret

Disclaimer: The purpose of this article is only to call attention to Microsoft’s new cloud service (Azure Government Secret), highlight its public features/services, and provide general guidance for those Microsoft customers who are eligible to use these new services. For ... continue reading
mark_serafine_0-1610111977713.png

Introduction to Microsoft Azure Government Secret

Disclaimer: The purpose of this article is only to call attention to Microsoft’s new cloud service (Azure Government Secret), highlight its public features/services, and provide general guidance for those Microsoft customers who are eligible to use these new services. For ... continue reading
m1.png

Microsoft Defender for Endpoint Upgrade Readiness MacOS Big Sur

Hi IT Pros, Today we discuss about preparing our MD for Endpoint on Organization’s MacOS Systems and make them ready for “Big Sur”, the greatest and latest version of Mac operating system which is released by Apple on the 12th ... continue reading
Advice for incident responders on recovery from systemic identity compromises

Advice for incident responders on recovery from systemic identity compromises

As Microsoft alongside our industry partners and the security community continues to investigate the extent of the Solorigate attack, our goal is to provide the latest threat intelligence including IOCs and guidance across our products and solutions to help the ... continue reading
Graph.png

Understanding “Solorigate”‘s Identity IOCs – for Identity Vendors and their customers.

Microsoft recently disclosed a set of complex techniques used by an advanced actor to execute attacks against several key customers. While we detected anomalies by analyzing requests from customer environments to the Microsoft 365 cloud, the attacks generalize to any ... continue reading
Protecting Microsoft 365 from on-premises attacks

Protecting Microsoft 365 from on-premises attacks

Many customers connect their private corporate networks to Microsoft 365 to benefit their users, devices, and applications. However, there are many well-documented ways these private networks can be compromised. As we have seen in recent events related to the SolarWinds ... continue reading