Authentication

Securing Azure OpenAI Usage with Azure Functions and Managed Identities: a Step-by-Step Guide

Context The Azure OpenAI Service provides REST API access to OpenAI’s advanced language models, including GPT-4, GPT-4 Turbo with Vision, GPT-3.5-Turbo, and the series of Embeddings models. These state-of-the-art models are highly adaptable and can be tailored to a variety of tasks such as generating content, summarizing information, interpreting images, enhancing semantic search, and converting […]

Securing Azure OpenAI Usage with Azure Functions and Managed Identities: a Step-by-Step Guide Continue Reading

THIS JUST IN!!!!  High LSASS Usage After Windows Update 3B March 2024

Jim and the Directory Services Team here again to alert you to an emerging issue which is an unintended consequence of a recent update released in March 2024.   What is LSASS and why is it important?  The Local Security Authority Subsystem Service (LSASS) is a process that handles user authentication, security policies, and auditing on

THIS JUST IN!!!!  High LSASS Usage After Windows Update 3B March 2024 Continue Reading

Protect Against OWASP API Top 10 Security Risks Using Defender for APIs

Overview The Open Web Application Security Project (OWASP) Foundation is a nonprofit foundation dedicated to improving software security through community-led open-source projects, education, and transparency. The OWASP API Security Project focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of APIs. In this post, we’ll dive into how Defender

Protect Against OWASP API Top 10 Security Risks Using Defender for APIs Continue Reading

Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season

Cybercriminals use social engineering during holidays and important events like tax season to steal user information. Our new Microsoft Threat Intelligence tax season report outlines some of the various techniques that threat actors use to craft their campaigns and mislead taxpayers into revealing sensitive information, making payments to fake services, or installing malicious payloads. These

Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season Continue Reading

Enhancing protection: Updates on Microsoft’s Secure Future Initiative

At Microsoft, we’re continually evolving our cybersecurity strategy to stay ahead of threats targeting our products and customers. As part of our efforts to prioritize transparency and accountability, we’re launching a regular series on milestones and progress of the Secure Future Initiative (SFI)—a multi-year commitment advancing the way we design, build, test, and operate our

Enhancing protection: Updates on Microsoft’s Secure Future Initiative Continue Reading

​​Secure SaaS applications with Valence Security and Microsoft Security​​

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.   Software as a service (SaaS) adoption has accelerated at a lightning speed, enabling collaboration, automation, and innovation for businesses large and small across every industry vertical—from government, education, financial service to tech companies. Every SaaS application is

​​Secure SaaS applications with Valence Security and Microsoft Security​​ Continue Reading

How to Set Up Sentinel Data Connectors for Kubernetes and GitHub

A guide to configure and use Sentinel Connectors to collect logs and data from your Kubernetes clusters and GitHub CI/CD pipelines. Part 2 of 3 part series about security monitoring of your Kubernetes Clusters and CI/CD pipelines by @singhabhi and @Umesh_Nagdev Link to Part 1 Introduction In part 1 of this series, we discussed the type of log sources you

How to Set Up Sentinel Data Connectors for Kubernetes and GitHub Continue Reading

Monitoring Kubernetes Clusters, Image Build Environment and Container Registries with Sentinel

A guide to using Microsoft Sentinel for monitoring the security of your containerized applications and orchestration platforms. Part 1 of 3 part series about security monitoring of your Kubernetes Clusters and CI/CD pipelines by @singhabhi and @Umesh_Nagdev   Introduction  Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that provides comprehensive threat detection and response capabilities

Monitoring Kubernetes Clusters, Image Build Environment and Container Registries with Sentinel Continue Reading

Protecting Tier 0 the Modern Way

How should your Tier 0 Protection look like? Almost every attack on Active Directory you hear about today – no matter if ransomware is involved or not – (ab)uses credential theft techniques as the key factor for successful compromise. Microsoft’s State of Cybercrime report confirms this statement: “The top finding among ransomware incident response engagements

Protecting Tier 0 the Modern Way Continue Reading

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE

Mobile devices are increasingly targeted by cyberattacks that can compromise your data, privacy, and productivity. To protect your devices from these threats, you need a Mobile Threat Defense (MTD) solution that can detect and respond to malicious activities on your device and network. Microsoft Defender for Endpoint is a unified endpoint security platform that provides

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE Continue Reading