As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident […]
Cyberattackers Put the Pedal to the Medal: Podcast
Fortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams.
built-in administrator account
Get started with Azure AD entitlement management automation
Introducing the new Azure Front Door: Reimagined for modern apps and content
This blog has been co-authored by Jessie Jia, Senior Program Manager, Azure Networking and Gunjan Jain, Principal Program Manager, Azure Networking. In 2019, we launched Azure Front Door to bring enterprise-grade content delivery network (CDN) capabilities to our customers. This was a result of our own cloud journey over the past 13 years, which led […]
Why is document version control important?
Azure confidential computing with NVIDIA GPUs for trustworthy AI
Many industries such as healthcare, finance, transport, and retail are going through a major AI-led disruption. The exponential growth of datasets has resulted in growing scrutiny of how data is exposed—both from a consumer data privacy and compliance perspective. For example, the use of AI in healthcare has grown rapidly, with hospitals and pharmaceutical companies […]
COPPA (Children’s Online Privacy Protection Act )
5 cybersecurity myths and how to address them
Secure your APIs with Private Link support for Azure API Management
Azure API Management is a fully managed service that enables customers to publish, secure, transform, maintain, and monitor APIs. With a few clicks in the Azure portal, you can create an API facade that acts as a “front door” through which external and internal applications can access data or business logic implemented by your custom-built […]