Authentication

Azure OpenAI Best Practices Insights from Customer Journeys

Introduction When integrating Azure OpenAI’s powerful models into your production environment, it’s essential to follow best practices to ensure security, reliability, and scalability. Azure provides a robust platform with enterprise capabilities that, when leveraged with OpenAI models like GPT-4, DALL-E 3, and various embedding models, can revolutionize how businesses interact with AI. This guidance document […]

Azure OpenAI Best Practices Insights from Customer Journeys Continue Reading

Microsoft Incident Response tips for managing a mass password reset

Explore how effective incident response helps organizations detect, address, and stop cyberattacks Learn more As part of any robust incident response plan, organizations often work through potential security weaknesses by responding to hypothetical cyberthreats. In this blog post, we’ll imagine a scenario in which a threat actor uses malware to infect the network, moving laterally

Microsoft Incident Response tips for managing a mass password reset Continue Reading

Document Intelligence and Index Creation Using Azure ML with Parallel Processing (Part 1)

Besides Azure portal, you can also do document intelligence and index creation in ML studio. The entire process of index creation includes several steps, crack_and_chunk, generate_embeddings, update_index, and register_index. In Azure ML studio you can create or use components for each of those steps and stitch them together as a pipeline.  Section 1. What is

Document Intelligence and Index Creation Using Azure ML with Parallel Processing (Part 1) Continue Reading

The four stages of creating a trust fabric with identity and network security

How implementing a trust fabric strengthens identity and network Read the blog At Microsoft, we’re continually evolving our solutions for protecting identities and access to meet the ever-changing security demands our customers face. In a recent post, we introduced the concept of the trust fabric. It’s a real-time approach to securing access that is adaptive

The four stages of creating a trust fabric with identity and network security Continue Reading

Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices

Since late 2023, Microsoft has observed an increase in reports of attacks focusing on internet-exposed, poorly secured operational technology (OT) devices. Internet-exposed OT equipment in water and wastewater systems (WWS) in the US were targeted in multiple attacks over the past months by different nation-backed actors, including attacks by IRGC-affiliated “CyberAv3ngers” in November 2023, as

Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices Continue Reading

6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy

Multicloud computing has become the foundation for digital businesses, with 86% of organizations having already adopted a multicloud approach.1 However, for all its benefits around increased agility, flexibility, and choice, we also see unique challenges with multicloud—including the need to manage security, identity, and compliance across different cloud service providers (CSPs), ensure data portability, and

6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy Continue Reading

Best Practice Guidance for PTU

Co-authors: Luca Stamatescu, Alex Shen, Ming Gu, Michael Tremeer Contributors: Ranjani Mani In today’s rapidly evolving tech landscape, proficiency with Azure OpenAI is crucial for maintaining a competitive edge. Enhanced by the latest announcements at Build 2024, this guide from our Global Black Belt team focuses on the effective management of Provisioned Throughput Units (PTUs)

Best Practice Guidance for PTU Continue Reading

Secure Model Deployments with Microsoft Entra and Managed Online Endpoints

Microsoft Entra ID token-based auth mode for managed online endpoints in Azure Machine Learning is now generally available. This new auth mode makes identity and access management easier when using models hosted on Azure. Plus, to deploy models securely and efficiently, Azure Machine Learning offers another great feature: managed online endpoints. In this blog, we’ll

Secure Model Deployments with Microsoft Entra and Managed Online Endpoints Continue Reading

Best Practices to Manage and Mitigate Security Recommendations

In the fast-evolving landscape of cloud security, Microsoft Defender for Cloud (MDC) stands as a robust Cloud Native Application Protection Platform (CNAPP). One of its standout features is the premium Cloud Security Posture Management (CSPM) solution, known as Defender CSPM. Among the myriads of advanced capabilities offered by Defender CSPM, the “Governance Rule” feature is

Best Practices to Manage and Mitigate Security Recommendations Continue Reading

Load Testing RAG based Generative AI Applications

When developing applications for Language Models (LLMs), we usually spend a lot of time on both the development and evaluation phases to ensure the app delivers high-quality responses that are not only accurate but also safe for users. However, a great user experience with an LLM application isn’t just about the quality of responses—it’s also about

Load Testing RAG based Generative AI Applications Continue Reading