Microsoft DDoS protection response guide

By Dustin Ward

Receiving Distributed Denial of Service (DDoS) attack threats? DDoS threats have seen a significant rise in frequency lately, and Microsoft stopped numerous large-scale DDoS attacks last year. This guide provides an overview of what Microsoft provides at the platform level, information on recent mitigations, and best practices. Microsoft DDoS platform Microsoft provides robust protection against…

Stay on top of database threats with Microsoft Defender for Azure Cosmos DB

By Dustin Ward

Databases are constantly evolving to handle new use cases, incorporate more intelligence, and store more data, giving developers and organizations a wide range of database types to meet their varying needs. Because aspects including architecture, capabilities, configuration options, and authentication methods are unique to each database type, so are the security threats—requiring custom security measures…

Observability from cloud to edge in Azure

By Dustin Ward

This post is co-authored by Rahul Bagaria, Principal Product Manager, Azure Monitor Customer Success Our customers are transforming their digital environments, whether migrating workloads to Azure, building new cloud-native apps, or unlocking new scenarios at the edge. As they combine these strategies to meet their business needs, they must also maintain their existing environments. It’s…

Announcing the public preview of Microsoft Azure Payment HSM service

By Dustin Ward

This blog post has been co-authored by May Chen, Product Manager, Azure Security. The growing trend for running payment workloads in the cloud Momentum is building as financial institutions move some or all their payment applications to the cloud. This entails a migration from the legacy on-premises applications and hardware security modules (HSM) to a cloud-based…

Improve your security defenses for ransomware attacks with Azure Firewall

By Dustin Ward

To ensure customers running on Azure are protected against ransomware attacks, Microsoft has invested heavily in Azure security and has provided customers with the security controls needed to protect their Azure cloud workloads. A comprehensive overview of best practices and recommendations can be found in the “Azure Defenses for Ransomware Attack” e-book. Here, we would like…

Enabling Zero Trust with Azure network security services

By Dustin Ward

This blog has been co-authored by Eliran Azulai, Principal Program Manager. With the accelerated pace of digital transformation since the COVID-19 pandemic breakthrough, organizations continuously look to migrate their workloads to the cloud and to ensure their workloads are secure. Moreover, organizations need a new security model that more effectively adapts to the complexity of…