Extending Azure security capabilities
As more organizations are delivering innovation faster by moving their businesses to the cloud, increased security is critically important for every industry.
As more organizations are delivering innovation faster by moving their businesses to the cloud, increased security is critically important for every industry.
We are excited to join the Game Developers Conference (GDC) this week to learn what’s new and share our work in Azure focused on enabling modern, global games via cloud and cloud-native technologies.
This is an exciting week for us at Microsoft. At RSA Conference 2019, we are announcing new and exciting capabilities in Azure and Microsoft 365. With this blog post, we wanted to share with you what we have been working on for Azure Security Center.
Recently the disclosure of a vulnerability (CVE-2019-5736) was announced in the open-source software (OSS) container runtime, runc. This vulnerability can allow an attacker to gain root-level code execution on a “host. runc” which is the underlying container runtime underneath many popular containers.
Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.
Microsoft acquires Citus Data to accelerate PostgreSQL perf and scale; IoT Hub device streams now in public preview; Azure API Management support for OpenAPI Specification v3 in preview; and so much more.
Azure Security Center now helps streamline this process of meeting compliance standards with the new regulatory compliance dashboard, recently released to public preview.
We’re continuing to focus on delivering the innovations our government customers and partners have requested. In this blog, you’ll find a brief summary of our recent announcements from late summer and early fall for your reference.
When an attacker compromises a machine, they typically have a goal in mind. Some attackers are looking for information residing on the victim’s machine or are looking for access to other machines on the victim’s network.
With an increasing number of recommendations and many security vulnerabilities surfaced, it is harder to triage and prioritize your response.