New capabilities to enable robust GDPR compliance
Today marks the beginning of enforcement of the EU General Data Protection Regulation (GDPR), and I’m pleased to announce that we have released an unmatched array of new features and resources to…
Today marks the beginning of enforcement of the EU General Data Protection Regulation (GDPR), and I’m pleased to announce that we have released an unmatched array of new features and resources to…
We have heard from our customers that investigating malicious activity on their systems can be tedious and knowing where to start is challenging.
Secure credential management is essential to protect data in the cloud.
Today we are excited to announce the general availability of the Azure DDoS Protection Standard service in all public cloud regions.
Migrating your workloads to the cloud can enable some inherent security benefits.
Today we’re at RSA, and we are delighted to sponsor and participate in this industry event centered in security.
Taking advantage of TDE with BYOK for databases that are geo-replicated to maintain high availability requires to configure and test the scenario carefully. This post will go over the most common configuration options.
We are pleased to announce the general availability of application security groups (ASG) in all Azure regions. This feature provides security micro-segmentation for your virtual networks in Azure.
We see strong customer interest in the blockchain solutions that are available on the Azure Marketplace. Today, we are excited to announce significant enhancements to our Ethereum on Azure offering.
We have heard from many customers about their challenges with detecting highly evasive threats. Today, we are discussing some of our more complex, heuristic techniques to detect malicious use of this vital protocol and how these detect key components of common real-world attacks.
Azure helps provide a highly secure foundation, built from the ground up, to host your infrastructure, applications, and data.
Azure Security Center provides several threat prevention mechanisms to help you reduce surface areas susceptible to attack. One of those mechanisms is Just-in-Time (JIT) VM Access.