{"id":132,"date":"2021-08-16T00:00:00","date_gmt":"2021-08-16T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/innovate-securely-with-azure"},"modified":"2025-06-25T03:46:34","modified_gmt":"2025-06-25T10:46:34","slug":"innovate-securely-with-azure","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/","title":{"rendered":"Innovate securely with Azure"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><em>This blog post has been co-authored by Carissa Broadbent,<\/em><em>&nbsp;Product Marketing Manager, Security Marketing.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This security challenge meets us on a variety of fronts. While attacks like Nobelium demonstrate the level of sophistication of organized nation-state actors, most attacks exploit far simpler vulnerabilities, that are often publicly documented with patches already available. Why is security so much more challenging today?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For defenders, the surface area to protect has never been larger. Security teams are often chronically understaffed. On top of that, they\u2019re overwhelmed by the volume of security signals\u2014much of which is noise\u2014and often spending valuable resources on non-security work, like maintaining infrastructure.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Something needs to change. Security needs to be a foundational principle, permeating every phase of the development process, from the <a href=\"https:\/\/azure.microsoft.com\/en-us\/overview\/security\/\" target=\"_blank\" rel=\"noopener\">cloud platform itself<\/a> to the <a href=\"https:\/\/github.com\/learn\/security\" target=\"_blank\" rel=\"noopener\">DevOps lifecycle<\/a>, to the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener\">security operations processes<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"azure-the-only-cloud-platform-built-by-a-security-vendor\">Azure: The only cloud platform built by a security vendor<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Facing these challenges requires you to embed security into every layer of architecture. As the only major cloud platform built by a security vendor, Azure empowers you to do that. Microsoft has deep security expertise, serving 400,000 customers including 90 out of the Fortune 100, and achieving $10 billion&nbsp;in security revenue as a result. Microsoft\u2019s security ecosystem includes products that are leaders in a total of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-leaders-gartner-magic-quadrant\" target=\"_blank\" rel=\"noopener\">five Gartner Magic Quadrants<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-security-forrester-wave-leader\" target=\"_blank\" rel=\"noopener\">seven Forrester Waves<\/a>, plus:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Microsoft employs more than 3,700 security experts and spends more than $1 billion on security every single year.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The volume of security signals that Microsoft analyzes is staggering\u2014more than 8 trillion signals every 24 hours.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">In 2020 alone Microsoft 365 Defender blocked 6 billion malware threats.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In a nutshell, we get security. It\u2019s this extensive experience that informs our approach to Azure security\u2014security that is built-in, modern, and holistic.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Security is not a destination, but a continuous journey. Well-funded nation-state attackers will always continue to innovate. That\u2019s why it\u2019s so important to choose a cloud vendor who is constantly monitoring for security threats, constantly raising the bar on the security of the platform, and constantly assessing best practices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"built-in-security-integrated-into-the-devops-lifecycle\">Built-in: Security integrated into the DevOps lifecycle<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Protecting your cloud innovation requires security to be built into every stage of the lifecycle and every level of architecture. If it isn\u2019t, then developers struggle to integrate security into the DevOps cycle and security analytics may be required to slow down innovation or assets go unprotected. That\u2019s why Azure has security built-in at every layer of architecture\u2014not only at the runtime level but also when writing code.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">GitHub Advanced Security features, for example, empower developers to deliver more secure code with built-in security capabilities like code scanning for vulnerabilities, secret scanning to avoid putting secrets like keys and passwords in code repositories. Another key area of focus is dependency reviews so that developers can update vulnerable open-source dependencies before merging code. This is important because 94 percent of projects use open source code in some form (GitHub Octoverse 2020 report).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Easily discover and turn on security tools with controls that are built directly into the Azure platform. Controls built into resources like the virtual machine, SQL, storage, and container blades puts security within easy reach for users beyond security professionals. Tools like <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\" target=\"_blank\" rel=\"noopener\">Azure Defender<\/a> help security operations (SecOps) to work at scale and enable protection and monitoring for all cloud resources. Azure also offers is broad policy support, automation, and actionable best practices.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Zero trust principles enforce security at every level of the organization. Azure is built on top of these key principles: verify explicitly and assume breach. Azure has a consistent Azure Resource Manager (ARM) layer to manage resources. This layer combines with our identity capabilities to deliver multi-factor authentication and least privilege access. What\u2019s more, you get an architecture literally designed for Zero Trust with Azure\u2019s built-in networking capabilities\u2014spanning micro-segmentation to firewalls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"modern-security-fueled-by-ai-and-the-scale-of-the-cloud\">Modern: Security fueled by AI and the scale of the cloud<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">When you\u2019re leveraging the power of AI and the scale of the cloud, defenders can protect, detect, and respond at a pace that enables them to get ahead of threats. It\u2019s here that Microsoft\u2019s wholesale commitment to security truly shines. Azure\u2019s security approach is also very modern, especially compared to the tools that customers are using on-premises.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The AI used in Azure security solutions is powered by threat intelligence from across Microsoft\u2019s entire security portfolio, encompassing trillions of signals per day and a large diversity of signals from the Microsoft Cloud. This allows Azure solutions to prioritize the most important incidents to raise to the security team, drastically cutting down on noise and saving SecOps precious time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, cloud-scale means that you always have the capacity you need, without investing in infrastructure setup and maintenance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"holistic-secure-your-entire-organization-including-azure-hybrid-and-multi-cloud\">Holistic: Secure your entire organization, including Azure, hybrid, and multi-cloud<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The attacks we\u2019ve seen in recent years have proven that the age of effective point solutions is long over. Relying on a patchwork of disparate security solutions not only makes it harder for security teams to do their jobs\u2014forcing them to pivot between many different tools\u2014it also introduces far too many gaps for attackers to slip between.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s why it\u2019s so important that security is holistic. Azure security solutions don\u2019t just help you protect Azure\u2014they protect your whole organization, including multi-cloud and hybrid environments. This gives you a unified view of your entire environment and enables SecOps to be more efficient with fewer tools.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example, at the development phase, GitHub Advanced Security helps secure code deployed on any cloud. SecOps can get a bird\u2019s eye view of your entire organization, including other clouds and your non-Microsoft security ecosystem, with <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener\">Azure Sentinel<\/a>, Microsoft\u2019s cloud-native SIEM. Or, take it to the next level with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\" target=\"_blank\" rel=\"noopener\">integrated SIEM and XDR<\/a> with Azure Sentinel, Azure Defender, and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/microsoft-365-defender\" target=\"_blank\" rel=\"noopener\">Microsoft 365 Defender<\/a> and get comprehensive coverage combined with a view of the more important incidents that need attention immediately.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Plus, manage your cloud security posture across Azure, AWS, Google Cloud, and on-premises within one user experience in <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-defender\/\" target=\"_blank\" rel=\"noopener\">Azure Defender<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"where-do-you-start\">Where do you start?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Azure\u2019s built-in, modern, and holistic solutions drastically simplify the process of securing your estate. But where do you start? Security is a shared responsibility. As an Azure customer here are five steps that we advise you to take now, whether you\u2019re a new customer or an existing user:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Turn on Azure Secure Score.<\/strong> Azure Secure Score, located in Azure Security Center, gives a numeric view of your Azure security posture.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Turn on multi-factor authentication.<\/strong> Identity is such an important threat vector, and multi-factor authentication significantly reduces risk.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Turn on Azure Defender for all cloud workloads.<\/strong> Azure Defender protects against threats like remote desktop protocol (RDP) brute-force attacks, SQL injections, attacks on storage accounts, and much more. You can turn on Azure Defender with just a few clicks.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Turn on Azure WAF and DDoS protection for every website.<\/strong> This will ensure your web applications are protected from malicious attacks and common web vulnerabilities.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Turn on Azure Firewall for every subscription<\/strong> to protect Azure virtual networks.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Ongoing, it\u2019s important that you assign a team member or partner to raise your Azure secure score percentage and engage your security operations team to action important incidents. This goes a long way towards improving your cloud security posture and lowering security risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Security can be an intimidating topic for some, but it doesn\u2019t have to be complicated. Azure\u2019s unique approach to security simplifies much of its complexity as we partner with you to deliver innovation. Learn more about Azure security solutions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\" target=\"_blank\" rel=\"noopener\">Azure Security Center<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-defender\/\" target=\"_blank\" rel=\"noopener\">Azure Defender<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener\">Azure Sentinel<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/network-security\/\" target=\"_blank\" rel=\"noopener\">Azure network security solutions<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/\" target=\"_blank\" rel=\"noopener\">Azure confidential computing<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1459],"tags":[],"audience":[3053,3056],"content-type":[1481],"product":[1806,1798],"tech-community":[],"topic":[],"coauthors":[90],"class_list":["post-132","post","type-post","status-publish","format-standard","hentry","category-security","audience-it-decision-makers","audience-it-implementors","content-type-thought-leadership","product-azure-defender","product-azure-security-center","review-flag-1680286584-658","review-flag-1-1680286581-825","review-flag-3-1680286581-173","review-flag-6-1680286581-909","review-flag-8-1680286581-263","review-flag-alway-1680286580-106","review-flag-forre-1680286585-445","review-flag-gartn-1680286585-730","review-flag-integ-1680286579-214","review-flag-microsofts","review-flag-never-1680286580-606","review-flag-new-1680286579-546","review-flag-partn-1680286579-901","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Innovate securely with Azure | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Innovate securely with Azure | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-16T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T10:46:34+00:00\" \/>\n<meta name=\"author\" content=\"Scott Woodgate\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Woodgate\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/scott-woodgate\/\",\"@type\":\"Person\",\"@name\":\"Scott Woodgate\"}],\"headline\":\"Innovate securely with Azure\",\"datePublished\":\"2021-08-16T00:00:00+00:00\",\"dateModified\":\"2025-06-25T10:46:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\"},\"wordCount\":1345,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\",\"name\":\"Innovate securely with Azure | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2021-08-16T00:00:00+00:00\",\"dateModified\":\"2025-06-25T10:46:34+00:00\",\"description\":\"Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Innovate securely with Azure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Innovate securely with Azure | Microsoft Azure Blog","description":"Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/","og_locale":"en_US","og_type":"article","og_title":"Innovate securely with Azure | Microsoft Azure Blog","og_description":"Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2021-08-16T00:00:00+00:00","article_modified_time":"2025-06-25T10:46:34+00:00","author":"Scott Woodgate","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Scott Woodgate","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/scott-woodgate\/","@type":"Person","@name":"Scott Woodgate"}],"headline":"Innovate securely with Azure","datePublished":"2021-08-16T00:00:00+00:00","dateModified":"2025-06-25T10:46:34+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/"},"wordCount":1345,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/","name":"Innovate securely with Azure | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2021-08-16T00:00:00+00:00","dateModified":"2025-06-25T10:46:34+00:00","description":"Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we\u2019ve witnessed an exponential increase in ransomware, supply chain attacks, phishing, and identity theft. These activities fundamentally threaten our human desire for security in situations such as ransomware attacks on hospitals or supply chain attacks on industrial environments.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/innovate-securely-with-azure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Innovate securely with Azure"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":2,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/132\/revisions"}],"predecessor-version":[{"id":43259,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/132\/revisions\/43259"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=132"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=132"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=132"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=132"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=132"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=132"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}