Tag: security Page 1 of 5

Microsoft Azure IP Advantage: Our first year

One year ago, we announced Azure IP Advantage, the industry’s leading program to help cloud service customers stay focused on their digital transformation journey and avoid IP issues. The program has been a tremendous success so far with many customers …

Integrate Azure Security Center alerts into SIEM solutions

We heard from several customers that you need a way to view your Azure Security Center alerts in your SIEM solution for a centralized view of your security posture across your organization. Today, we are excited to announce the public …

Managing Azure Secrets on GitHub Repositories

Background

An increasing number of developers across the globe use GitHub to host their projects, and many of them use GitHub public repositories for their open source work. While this is a great way to contribute and leverage the power …

Exchange Server TLS guidance, part 1: Getting Ready for TLS 1.2

Overview

As the realm of security in technology continues to evolve over time, every so often we say hello to newer and more competent versions of technologies while saying goodbye to their older siblings.

By the time you are reading …

Compliance assessment reports for Azure Stack are now available

A few months ago, we announced we were performing a compliance assessment on Microsoft Azure Stack, today we are happy to share that the compliance assessment is done and available to you.

Knowing that preparing compliance paperwork is a …

Azure Search enterprise security: Data encryption and user-identity access control

Enterprise security requires a comprehensive approach for defense in depth. Effective immediately, Azure Search now supports encryption at rest for all incoming data indexed on or after January 24, 2018, in all regions and SKUs including shared (free) services. With …

Serious about cloud security? Check out this new training on Azure Security Center

Security threats increase in volume and sophistication every day. And regardless of your organization’s size or the industry you’re in, Azure Security Center threat detection capabilities, alerts, and recommended fixes can give you the tangible data you need to help …

Microsoft’s Spectre/Meltdown Guidance for Exchange Server and Office 365 Customers

Spectre and Meltdown are attacks against previously undisclosed vulnerabilities in modern processors (CPUs). The names “Spectre” and “Meltdown” were chosen because they exploit vulnerabilities in “speculative execution” (a technique that allows processors to work really fast) and “melt security boundaries”.…

How Azure Security Center helps analyze attacks using Investigation and Log Search

Every second counts when you are under attack. Azure Security Center (ASC) uses advanced analytics and global threat intelligence to detect malicious threats, and the new capabilities empower you to respond quickly. This blog post showcases how an analyst can …

Azure Security Center adds support for custom security assessments

Azure Security Center monitors operating system (OS) configurations using a set of 150+ recommended rules for hardening the OS, including rules related to firewalls, auditing, password policies, and more. If a machine is found to have a vulnerable configuration, a …

Azure Security Center and Microsoft Web Application Firewall Integration

Web applications are increasingly becoming targets of attacks such as cross-site scripting, SQL injection, and application DDoS. While OWASP provides guidance on writing applications that can make them more resistant to such attacks, it requires rigorous maintenance and patching at …

Whitepaper: Selecting the right secure hardware for your IoT deployment

How do you go about answering those perplexing questions such as what secure hardware to use? How do I gauge the level of security? How much security do I really need and hence how much premium should I place on

Securing Azure customers from CPU vulnerability

An industry-wide, hardware-based security vulnerability was disclosed today. Keeping customers secure is always our top priority and we are taking active steps to ensure that no Azure customer is exposed to these vulnerabilities. At the time of this blog …

Announcing the public preview for Adaptive Application Controls

At Microsoft Ignite, we announced new adaptive applications controls that protect your applications from malware by using whitelisting rules. Today, we are excited to share that these capabilities are available for public preview in Azure Security Center. 

Application controls, such …

How Azure Security Center detects vulnerabilities using administrative tools

This blog post is authored  by Dotan Patrich, Senior Software Engineer, Azure Security Center and by Yossi Weizman, Security Software Engineer Intern, Azure Security Center.

Earlier this year, Rob Mead wrote a great article on the techniques used at scale

Reference Architecture and automation for Financial Services web applications

Today we are pleased to announce the release of a new Azure Financial Services Regulated Workloads Blueprint.

The Azure Security and Compliance Blueprint Program provides automated solutions and guidance for rapid deployment of Azure services that meet specific regulatory …

Microsoft Releases Advisory for Azure AD Connect Service Account Security Risk

Microsoft has issued a security advisory to Office 365 customers via the Message Center. The advisory lets customers know about a recently disclosed issue with the security restrictions on the service account in Active Directory that Azure AD Connect creates …

Microsoft expands scope of Singapore MTCS certification

I am pleased to announce the renewal of the Singapore Multi-Tier Could Security (MTCS) Certification Level 3. As part of its commitment to customer satisfaction, Azure has adopted the MTCS standard to meet different cloud user needs for data sensitivity …

Don’t build your cloud home on shaky foundations

You probably wouldn’t furnish a house you’re building with a state of the art entertainment system without first installing doors and an alarm system. Similarly, it isn’t advisable to put valuable applications and data used to run your business in …

Azure SQL Databases Disaster Recovery 101

Why should I care?

As a PaaS service, Azure SQL provides automated backup for all databases. It allows customers to recover their data from system or human errors and restores the databases to any point in time during the retention. …

Azure DNS Updates – CAA Record Support and IPv6 Nameservers

We are pleased to announce a couple of updates to Azure DNS that have been long awaited by our customers:

  • Support for Certificate Authority Authorization (CAA) Records
  • IPv6 Nameservers

Support for CAA Records

The Certification Authority Authorization (CAA) resource record …

Azure Virtual Datacenter

An approach to isolation, security, and trust in the Microsoft cloud

I am excited to announce the distribution of Azure Virtual Datacenter guidance. Azure Virtual Datacenter (VDC) is an approach to making the most of the Azure cloud platform's …

Detecting in-memory attacks with Sysmon and Azure Security Center

In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks.

These attacks …

Microsoft Recommending Non-Expiring Passwords to Office 365 Customers

My Office 365 admin portal displayed a new recommendation when I logged in last week. Microsoft is recommending that user account passwords be set to never expire. My tenant is currently set to an expiry period of 90 days, whereas …

Azure is certified to meet strict UK Government Cyber Essentials PLUS requirements

Cyber Essentials PLUSIn our continuous efforts to knock down potential customer blockers to leveraging Microsoft Azure’s expanding offerings available in the UK, I am happy to announce that Azure has attained the UK’s Cyber Essentials PLUS badge and meets the requirements outlined …

Detect the latest ransomware threat (aka Bad Rabbit) with Azure Security Center

This blog post was authored by Tim Burrell, Principal Engineering Manager, Microsoft Threat Intelligence Center .

The Windows Defender team recently updated the malware encyclopedia with a new ransomware threat, Ransom:Win32/Tibbar (also known as Bad Rabbit). This update includes comprehensive …

Azure powers the industrial Internet

We know that every business is different, but the cloud is foundational to digital transformation. We’re proud that Azure has been at the forefront of helping companies across industries transform. Today, Satya Nadella is sharing the stage with GE’s …

How Azure Security Center automates the detection of cyber attack

Earlier this year, Greg Cottingham wrote a great article breaking down an example of an Azure Security Center detected attack against SQL Server. In this post, we'll go into more detail on the way that security center analyzes data …

How Azure Security Center unveils suspicious PowerShell attack

In honor of National Cybersecurity Awareness Month (NCSAM), we have a new post in our series highlighting real-world attacks that Azure Security Center helped detect, investigate, and mitigate. This post is about an attack which used PowerShell to run malicious …

What is a CVE and How Can It Benefit Me?

Like a lot of the things that I write here, this is a question that came up in a ticket that I worked on recently. A customer recently received a message like this: Samba is a freely available file- and …

Announcing support for X.509 CA on Azure IoT Hub

We’re pleased to announce support for X.509 Certificates Authorities (X.509 CA) on Azure IoT Hub!

The use of X.509 CA simplifies the creation of initial unique Internet of Things (IoT) certificate identities for devices in the device manufacturing flow. Instead …

Quarterly Microsoft Azure SOC reports: Compliance at warp speed

imageResponding to customers’ need for speed, Microsoft Azure has published six new Service Organization Control (SOC) reports, just three months after the previously issued reports. Azure is the first and only enterprise cloud provider to support quarterly SOC reports.

A …

The Importance of Updating the Exchange Online Remote PowerShell Module

A recent episode of the popular Risky Business infosec podcast titled “Good Microsoft, Bad Microsoft” discusses a security vulnerability in a PowerShell tool used to manage Exchange Online. I have listened to the podcast twice (once the first time, and …

How Azure Security Center uses machine learning to enable adaptive application control

While the threat landscape has changed dramatically over the last several years, malware detection continues to be one of the biggest issues. There is an endless race – attackers develop new malware, security vendors create new signatures to detect it, …

Securing the Intelligent Edge

The Intelligent Edge brings the power of the cloud to mobile and Internet of Things (IoT) devices and demands security for trust. Azure IoT Edge is an implementation of the Intelligent Edge. Cloud-enabled computing at the edge means concentrating data, …

Announcing Virtual Network integration for Azure Storage and Azure SQL

Today, we are glad to announce the public preview of Virtual Network (VNet) Service Endpoints for Azure Storage and Azure SQL. 

For many of our customers moving their business-critical data to the cloud, data breaches remain a top concern. Various …

Announcing Preview of Azure Storage Firewalls and Virtual Networks

Enterprises are faced with the daunting challenge of engaging their employees, customers, and partners in today's hostile and dangerous online environement. They are increasingly turning to layered security approaches that help them stay secure in the face of potential failures of …

Azure DDoS Protection Service preview

This blog post was co-authored by JR Mayberr,y Principal PM Manager & Anupam Vij, Senior Program Manager, Azure Networking.

Distributed Denial of Service (DDoS) attacks are one of the top availability and security concerns voiced by customers moving their applications …

Nagrania zajęć i prezentacje z Letniej Akademii SUSE

Za nami druga edycja Letniej Akademii SUSE. Podczas zajęć pokazywaliśmy najbardziej interesujące funkcje naszych rozwiązań, ale także jak zacząć z nich korzystać. Mówiliśmy m.in. o konteneryzacji (Kubernetes/MicroOS/Salt), wdrażaniu chmur (OpenStack) i pamięci masowej zdefiniowanej programowo (Ceph), zapewnieniu ciągłości działania (Live …

Servicing Azure Stack using the Update resource provider

In today’s world, security is paramount. Microsoft is committed to ensuring your Azure Stack environment stays both secure and functional – as it delivers consistency to build and deploy applications using the same approach, APIs, DevOps tools, and portal, as …

Extending Microsoft Azure IP Advantage to China

This blog post was authored by Erich Andersen, Corporate Vice President and Chief IP Counsel, Microsoft Intellectual Property. 

Cloud-fueled digital transformation enables companies around the world to create new products and services, and engage with their customers at an unprecedented …

Simplifying OPC UA security for everyone

At the IoT Expo in Taipei, we were excited to announce our contribution of an open-source, cross-platform OPC UA Global Discovery Server (GDS) to the OPC Foundation. As we have done with our UA-.Net Standard cross-platform reference stack contribution

Introducing Azure confidential computing

Microsoft spends one billion dollars per year on cybersecurity and much of that goes to making Microsoft Azure the most trusted cloud platform. From strict physical datacenter security, ensuring data privacy, encrypting data at rest and in transit, novel uses …

Azure Black Belt Networking and Security Presents Microsoft Networking Academy – Fall 2017

Welcome to this new season of our networking, and now security, webinar series! We’re hoping that this show will be helpful in delivering valuable content for anyone who’s looking at starting to consume information about the Azure cloud, or developing their …

Do You Really Need an SPF Record?

For some time now I’ve considered Sender Policy Framework (SPF) records an essential part of domain name ownership. As it turns out there’s still some debate in tech forums as to whether SPF records are required or not.

SPF records …

Our CVE Pages – self help to security issues in SUSE Linux Enterprise

SUSE CVE Pages SUSE offers various self-service options for getting information on Security Issues. One of these self-service options that are intended for human consumption are our CVE Pages. For every CVE that might be related to our products we …

How we secure your data in Azure AD

Howdy folks,

With all the breaches of cloud identity services over the last few years, we get a lot of questions about how we secure customer data. So today’s blog is a dive into the details of how

SMB Version 1 disabled Azure Gallery Windows operating system images

The Azure security team has recently driven some changes into the default behavior of Windows operating system images that are available in the Azure gallery. These changes are in response to recent concerns over malware that has been able to …

Preview: SQL Transparent Data Encryption (TDE) with Bring Your Own Key support

We’re glad to announce the preview of Transparent Data Encryption (TDE) with Bring Your Own Key (BYOK) support for Azure SQL Database and Azure SQL Data Warehouse! Now you can have control of the keys used for encryption at rest …

The Curious Case of LinkedIn Data Sharing with Microsoft Azure Active Directory and Office 365

I have a long-standing gripe with LinkedIn for the aggressive harvesting of contacts from their users. I use LinkedIn to a limited extent for professional connections, but I’m always careful to keep it separate and isolated as much as …

Security and Compliance in Azure Stack

Security posture and compliance validation roadmap for Azure Stack

Security considerations and compliance regulations are important drivers for people that choose to control their infrastructure using private/hybrid clouds while using IaaS and PaaS technologies to modernize their applications. Azure Stack …

How Azure Security Center aids in detecting good applications being used maliciously

We’ve written in the past about how Azure Security Center helps detect malicious activity on compromised VMs, including a post detailing a Bitcoin mining attack and one on an outbound DDoS attack. In many cases, attackers use a set …

Microsoft Azure expands with two new regions for Australia

I am delighted that Microsoft Azure will be expanding into two new regions in Australia. This increases the number of Azure regions announced across the globe to 42, which is more than any other major cloud provider. Microsoft will become …

Azure AD authentication extensions for Azure SQL DB and SQL DW tools

With the latest SQL server tools release we extended the Azure AD authentication support for SQL DB and DW tools for token-based authentication (Universal authentication) with MFA support.

The following SQL Server tools have been extended adding new functionality:

  • SSMS

Azure Active Directory Conditional Access Policies and the Office 365 Portal

Microsoft is rolling out a change from August 9th 2017 for Azure Active Directory conditional access policies. Before this change rolls out any user logins to the Office 365 portal are not subject to conditional access requirements (e.g. enforcing multi-factor …

Microsoft Azure leads the industry in ISO certifications

We are happy to announce that Microsoft Azure recently completed a new set of independent third-party ISO and Cloud Security Alliance (CSA) audits to expand our certification portfolio.  Azure leads the industry with the most comprehensive compliance coverage, enabling customers …

How Azure Security Center helps protect your servers with Web Application Firewall

Our adversaries have many tools available on the Internet for use in mounting cyberattacks. Many of these tools enable them to gain access and control of enterprise IT resources. In the meantime, security professionals are not always aware of the …

How to Use Azure Active Directory Conditional Access to Enforce Multi-Factor Authentication for Unmanaged Devices

Microsoft provides some different options for securing Office 365 and Azure applications with multi-factor authentication (MFA). For your end users you can choose from:

  • MFA for Office 365, which provides basic MFA functionality for Office 365 applications only.
  • Azure MFA,

Azure Cyber Analytics Program for Power and Utilities Customers

The utilities industry is under continuous and persistent threat. The Ukraine attack was a wake-up call for many utilities who would not have considered something as improbable as a serial-to-Ethernet gateway vulnerability to be one of the key factors in …

How Azure Security Center detects DDoS attack using cyber threat intelligence

Azure Security Center automatically collects, analyzes, and integrates log data from a variety of Azure resources. A list of prioritized security alerts are shown in Security Center along with the information you need to quickly investigate the problem along with …

What’s New in Office 365 for June 2017

Office 365 for IT Pros, 4th Edition is continually updated with new information, changes and corrections. Customers who bought the book from this website can download the updated files from their purchase history. Updates applied to the Amazon Kindle

Petya ransomware prevention & detection in Azure Security Center

This blog post was authored by Tim Burrell, Principal Engineering Manager, Microsoft Threat Intelligence Center​.

Microsoft Malware Protection Center (MMPC) published a blog post yesterday detailing a new ransomware infection that appears to have begun in Ukraine and spread from …

“Secure transfer required” is available in Azure Storage account

The "Secure transfer required" feature is now supported in Azure Storage account. This feature enhances the security of your storage account by enforcing all requests to your account through a secure connection.

This feature is disabled by default. For more details, …

GDPR Questions? Azure has answers.

Microsoft is here to help

Please have a look at our white paper How Microsoft Azure Can Help Organizations Become Compliant with the EU General Data Protection Regulation to gain an understanding of how your organization can use currently available …

Announcing public preview of Apache Kafka on HDInsight with Azure Managed disks

HDInsight set a firm goal of helping enterprises build secure, robust, scalable open source streaming pipelines on Azure. To meet this goal, a few months ago we announced a limited preview of Managed Kafka on Azure HDInsight. The addition …

Azure Security Center adds Context Alerts to aid threat investigation

In two recent articles Greg Cottingham and Jessen Kurien described investigation processes triggered by a security alert. If you haven't already done so, please read “How Azure Security Center helps reveal a Cyberattack” and “How Azure Security

WannaCrypt attacks: guidance for Azure customers

The recent global ransomware attack, known as WannaCrypt, has brought forward the importance of running a well secured infrastructure. Whether or not you were impacted by the recent WannaCrypt malware, we recommend all Azure customers take the following 8 steps …

Demystifying Certificate Based Authentication with ActiveSync in Exchange 2013 and 2016 (On-Premises)

Some of the more complicated support calls we see are related to Certificate Based Authentication (CBA) with ActiveSync. This post is intended to provide some clarifications of this topic and give you troubleshooting tips.
What is Certificate Based Authentication (CBA)? …

“How to make a movie the secure way” at NAB Show 2017

At the NAB Show 2017 Conference this week, we’ll be reprising our session “Securing the Making of the Next Hollywood Blockbuster(Las Vegas | April 25, 2017 | 1:30 PM – 2:00 PM in the Cybersecurity & Content

How Azure Security Center detects a Bitcoin mining attack

Azure Security Center helps customers deal with myriads of threats using advanced analytics backed by global threat intelligence. In addition, a team of security researchers often work directly with customers to gain insight into security incidents affecting Microsoft Azure customers, …

Disk format change going from 6.x to vSAN 6.6?

Advertise here with BSA

Internally I received a comment around the upgrade to 6.6 and the disk format version change. When you upgrade to 6.6 also the version of  disk changes, it goes to version 5. In the past with …

Networking to and within the Azure Cloud, part 2

This is the second blog post of a three-part series. Before you begin reading, I would suggest reading the first post Networking to and within the Azure Cloud, part 1.

Hybrid networking is a nice thing, but the question …

Reporting Office 365 Admin Role Group Members

Office 365 allows organizations to delegate administrative privileges in a granular fashion. There is an over-arching “Global Administrator” role, as well as a series of lower privilege roles for specific administrative tasks. A partial list of the admin roles is …

Networking to and within the Azure Cloud, part 1

Hybrid networking is a nice thing, but the question then is how do we define hybrid networking? For me, in the context of the connectivity to virtual networks, ExpressRoute’s private peering or VPN connectivity, it is the ability to …

Using Debugging Tools to Find Token and Session Leaks

Hello AskDS readers and Identity aficionados. Long time no blog.

Ryan Ries here, and today I have a relatively “hardcore” blog post that will not be for the faint of heart. However, it’s about an important topic.

The behavior surrounding …

How Azure Security Center helps reveal a Cyberattack

The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts and detections. ASC helps customers keep pace with rapidly evolving threats by using …

Restricting OneDrive Sync to Domain Joined PCs

For some organizations there is a concern when deploying OneDrive for Business that users will access corporate data from their personal computers. If the personal computers are not well secured, such as having encrypted drives and good antivirus software, or …

Adding offerings and UK Region: Azure rolls deep with PCI DSS v3.2

Azure rolls deep with PCI DSS v3.2

Check out our AoC

Go here to download Azure’s Payment Card Industry Data Security Standard (PCI DSS) v3.2  Attestation of Compliance (AoC)! When it comes to enabling customers who want or need to operate in a cloud environment …

Large-Scale Analysis of DNS Query Logs Reveals Botnets in the Cloud

This post was co-authored by Tomer Teller, Senior Security Program Manager, Azure Security.

The arms race between data security professionals and cybercriminals continues at a rapid pace. More than ever, attackers exploit compute resources for malicious purposes by deploying malware, …

How Important Are Important Security Updates?

I’ve seen a lot of customer environments that have a Microsoft security patching policy that could be summarized as:

  • Critical patches deployed ASAP
  • Everything else can wait

The idea is that the most critical vulnerabilities get rolled out as fast …

How Secure is Sending Emails to Microsoft Teams Channels?

One of the features of Microsoft Teams is the ability to send email to Team channels. When a channel receives an email, a new discussion thread is started, and the Team members can discuss the topic within Teams (replies do …

Announcing new capabilities of HDInsight and DocumentDB at Strata

This week in San Jose, Microsoft will be at Strata Hadoop + World where will be announcing new capabilities of Azure HDInsight, our fully managed OSS analytics platform for running all open-source analytics workloads at scale, with enterprise grade …

DocumentDB: API for MongoDB now generally available

Today, we are excited to announce that DocumentDB: API for MongoDB is generally available. The API for MongoDB allows developers to experience the power of the DocumentDB database engine with the comfort of a managed service and the familiarity of …

Conditional Access “limited access” policies for SharePoint are in public preview!

Howdy folks,

Enabling productivity while securing data is the fine line IT pros walk today, and having the right tools to do it makes it that much easier. In the past, employees working from their personal devices was a …

Microsoft Mechanics Video: New Conditional Access capabilities in Azure AD and Enterprise Mobility + Security!

Howdy folks,

Ive talked and written a lot about vision of Identity as the New Control Plane.

This is based on the idea that as more and more of a companys digital resources live outside the corporate network,

Proactively Responding to #CloudBleed with Splunk

cloudbleed

What is CloudBleed?

Cloudbleed is a serious flaw in the Cloudflare content delivery network (CDN) discovered by Google Project Zero security researcher Tavis Ormany. This vulnerability means that Cloudflare leaked data stored in memory in response to specifically-formed requests. The …

Does Office 365 Secure Score Help Detect Hackers and Intrusions?

In an email from a reader I was asked about Office 365 Secure Score and whether it will help their organization to know when hackers have gained access to their Office 365 data. The short answer is no, that’s not …

From API to easy street within minutes

30? 20? …15? It all depends on how well you know your third-party API. The point is that polling data from third-party APIs is easier than ever. CIM mapping is now a fun experience.

Want to find out more about …

SSL Proxy: Splunk & NGINX

Who is this guide for?

It is a best practice to install Splunk as a non-root user or service account as part of a defense in depth strategy. This installation choice comes with the consequences of preventing the Splunk user …

Adaptive Response: A Level Deeper for Continued Customer Success

Splunk at RSA Conference 2017bOver the past three or four years, we’ve been hearing more and more about analytics-driven security at RSA. Years ago, when Splunk first introduced the concept to the marketplace, we were living in a world where security practitioners were still …

Find Malicious Insiders Before You Become a Headline

Screen Shot 2017-02-14 at 10.13.21 AMThe media is filled with reports of Russia’s possible influence over the U.S. presidential elections. While American security agencies are investigating the Kremlin’s possible involvement in a hack of the Democratic National Committee, a U.S. Intelligence Service unclassified report suggests …

Demo Tuesday // Shielded Virtual Machines in Windows Server 2016

Welcome to our Demo Tuesday Series. Each week, we will be highlighting a new product feature from the Hybrid Cloud Platform.

You cant put virtual machines (VMs) under lock and key

Customers are virtualizing pretty much everything they can today, …

Key updates to Azure Backup Server

Microsoft Azure Backup Server (MABS) is a cloud-first backup solution to protect data and workloads across heterogeneous IT environments of enterprises. It is available as a free download with Azure Backup without the requirement of System Center License or SQL …

Safeguarding your cloud resources with Azure security services

While cloud security continues to be a top concern, we recently shared insights from a survey that show overall concern has dropped significantly since 2015. We’re now at a stage where half of organizations contend the cloud is more secure …

First Steps: Securing Office 365 Administrator Accounts with Multi-Factor Authentication

When you sign up a new Office 365 tenant a Global Admin account is created for you. This Global Admin account, and any other admin accounts you create later on, are highly privileged, powerful accounts that need to be protected …

Splunk and Cisco Umbrella: See what you’ve been missing…

The following is a guest post by Rachel Ackerly, product marketing manager, Cisco Umbrella.

Screen Shot 2017-02-13 at 9.40.19 AM

Do you have eyes in the back of your head? (Unless you’re my mother, there is a good chance you don’t.) Many security products claim …

Preview the new enhancements to Azure Security Center

While the cloud may have initially raised some security concerns among enterprises, Microsoft is changing those dynamics. By tapping into the collective power of millions of cloud customers, Microsoft can help each customer more effectively defend against the increasing volume …

Announcing Azure SQL Database Threat Detection general availability coming in April 2017

Today we are happy to announce that Azure SQL Database Threat Detection will be generally available in April 2017. Through the course of the preview we optimized our offering and it has received 90% positive feedback from customers regarding the …

Announcing the new Azure Marketplace experience

This post was co-authored by Vybava Ramadoss, Senior Program Manager, Azure Marketplace.

Azure Marketplace provides a rich catalog of thousands of products and solutions from independent software vendors (ISVs) that have been certified and optimized to run on Azure. …

Analyzing BotNets with Suricata & Machine Learning

Since the official rollout at the year’s. conf of the Machine Learning Toolkit(MLTK), Splunkers have been pursing some interesting use cases ranging from IT operations, planning, security and business analytics. Those use cases barely scratch the surface …