2019年8月20日
Azure Security Center provides you with a bird’s eye security posture view across your Azure environment, enabling you to continuously monitor and improve your security posture using secure score in Azure.
Miri Landau
Senior Program Manager, Azure Security Center
2019年6月4日
Infrastructure security is top of mind for organizations managing workloads on-premises, in the cloud, or hybrid. Keeping on top of an ever-changing security landscape presents a major challenge.
2019年5月30日
One of the biggest attack surfaces for workloads running in the public cloud is connections to and from the public internet. Our customers find it hard to know which network security group (NSG) rules should be in place to make sure that Azure workloads are only available to required source ranges.
Oren Parag
Senior Program Manager, Azure Security Center
2019年4月3日
As more organizations are delivering innovation faster by moving their businesses to the cloud, increased security is critically important for every industry. Azure has built-in security controls across data, applications, compute, networking, identity, threat protection, and security management so you can customize protection and integrate partner solutions.
2019年3月4日
This is an exciting week for us at Microsoft. At RSA Conference 2019, we are announcing new and exciting capabilities in Azure and Microsoft 365. With this blog post, we wanted to share with you what we have been working on for Azure Security Center.
2019年2月14日
Recently the disclosure of a vulnerability (CVE-2019-5736) was announced in the open-source software (OSS) container runtime, runc. This vulnerability can allow an attacker to gain root-level code execution on a "host. runc" which is the underlying container runtime underneath many popular containers.
2019年1月29日
Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.
2019年1月24日
Azure Security Center now helps streamline this process of meeting compliance standards with the new regulatory compliance dashboard, recently released to public preview.
Ronit Reger
Senior Program Manager, Azure Data Security
2018年11月7日
When an attacker compromises a machine, they typically have a goal in mind. Some attackers are looking for information residing on the victim’s machine or are looking for access to other machines on the victim’s network. Other times, attackers have plans to use the processing power of the machine itself or even use the machine as a launch point for other attacks.
2018年10月4日
Azure Security Center automatically collects, analyzes, and integrates log data from your Azure resources to detect threats.