Security
Protect your enterprise from advanced threats across hybrid cloud workloads.
Key Resources
Newsfeed: | RSS |
---|
News
Date | News |
---|---|
5/14/2024 |
Introduction
The recent advances in LLMs have created opportunities for businesses to gain new insight into their unstructured text data. A classic example of this has been using the popular...
|
5/7/2024 |
We are excited to announce the Azure Web Application Firewall and Azure Firewall integrations in Microsoft Copilot for Security. This is the first step we are taking toward bringing interactive,...
|
4/30/2024 |
This blog post aims to walk you through the setup of an autoscaled application on Azure Kubernetes Service (AKS) with Kubernetes-based Event-Driven Autoscaling (KEDA), activated by Microsoft SQL...
|
4/24/2024 |
At KubeCon Europe 2024, we showed how Azure and Kubernetes can help you build and deploy intelligent applications. Even if you couldn’t visit us at the Microsoft booth or attend the conference...
|
4/24/2024 |
In today's rapidly evolving tech landscape, seamless integration stands as the cornerstone of innovation and growth. As a technology decision-maker, you understand the pivotal role integrations...
|
4/22/2024 |
Join in: The European Cloud 2024 | May 14-16, 2024 | European Cloud Summit
What: European Cloud Summit and European Collaboration Summit – co-located in 2024
Register today |Use...
|
4/15/2024 |
Background:
The Revoke Sign in session via REST API is frequently used in Sentinel playbook. However the template is old and the 'Revoke user session' part could not work. What's more there is...
|
4/11/2024 |
Jacob DePriest is the Deputy Chief Security Officer at GitHub! From discussing the challenges of maintaining the security of one of the world’s largest code repositories to sharing insights on...
|
4/11/2024 |
GraphQL offers a wide array of advantages, such as reduced over-fetching of data and understandable description of the data in your API and makes it easier to evolve APIs over time. However, it...
|
4/4/2024 |
Azure Virtual Network Manager's security admin rule configuration is now generally available in 45 regions, empowering users to enforce security rules across their virtual networks globally.
|
3/29/2024 |
ChatGPT Ecommerce System
This solution guide presents a novel approach that leverages Large Language Models, such as ChatGPT, to address the limitations found in traditional recommendation...
|
3/20/2024 |
This month we are announcing several new security features for the Power Platform. Admins will now have one place to manage Power Platform security at scale using the new Security Hub. Multiple...
|
3/18/2024 |
You can now directly configure allowed ports in your nodepool settings.
|
2/29/2024 |
Optimizing existing cloud environments is consistently the top cloud initiative for nearly every tech company, and the benefits of skilling your organization on optimization abound. Optimizing...
|
2/29/2024 |
Introduction to Backstage
Backstage, originally created by a small team during a hack week, is now a CNCF Incubation project. An incubation project means that it is considered stable and...
|
2/27/2024 |
Many developers rely on Docker Hub to consume public content such as container images, Helm charts, and other artifacts, often without authenticating. However, when you have dependencies on...
|
2/21/2024 |
In our previous Azure Architecture blog post, we discussed how the Azure Expert Assessment offering can help organizations identify the best cloud solutions for their business goals by offering...
|
2/15/2024 |
This is a step by step, no fluff guide to building and architecting cloud native applications.
Cloud application development introduces unique challenges: applications are distributed, scale...
|
2/12/2024 |
Welcome to the second installment of our multipart series on simplifying Azure Kubernetes Service (AKS) authentication. In this article, we delve deeper into the intricacies of AKS setup,...
|
2/12/2024 |
If you’ve ever engaged with the content on the Microsoft Learn platform, it's highly likely that the material you utilized was written or co-authored by dedicated contributors. These...
|