Serious about security? Check out Azure Security Center

In “Hybrid Cloud Workload Protection with Azure Security Center,” a new course available on Microsoft Virtual Academy (MVA), Yuri Diogenes and Ty Balascio offer an overview of Azure Security Center, including requirements, planning, onboarding, and troubleshooting. Yuri and Ty work with real-world data and share their experience in the field to show how the threat…


Azure Administrator Account Security

In this short post I wanted to share a couple of recommendations that I give to customers to ensure their Azure administrator accounts are secured. Because the resources you deploy in Azure (or any cloud for that matter) are in all likelihood critical to running your business, you need to ensure the credentials themselves used…


VSTS will no longer allow creation of new MSA users with custom domain names backed by AzureAD

On September 15, 2016, the Azure Active Directory (Azure AD) team blocked the ability to create new Microsoft accounts using email addresses in domains that are configured in Azure AD. Many VSTS customers expressed concern when this change happened. As a result, we worked with the Azure AD team to get a temporary exception for…


Optimize Uptime While Staying Secure

With the recent announcement of the industry-wide, hardware-based CPU vulnerability, organizations must ensure they have appropriately updated their infrastructure to secure their environment. Microsoft Azure Government customer environments were patched prior to the public announcement. Additionally, Microsoft publicly announced the patching procedures this week. If you are an Azure Government customer, you have peace of mind…


SAP on Azure: General Update – January 2018

SAP and Microsoft are continuously adding new features and functionalities to the Azure cloud platform. This blog includes updates, fixes, enhancements and best practice recommendations collated over recent months. 1. M-Series, Dv3 & Ev3-Series VMs Now Certified for NetWeaver Three new VM types are certified and supported by SAP for NetWeaver AnyDB workloads. AnyDB refers…


Using Managed Service Identities in Functions to Access Key Vault

In my previous blog post I walked through a scenario leveraging Azure Functions and Event Grid to handle blob replication between storage accounts. There was one piece of that solution that I wasn’t particular fond of, and that was the fact that I had the storage account connection string hard coded in the Function itself….


Alternative way to protect your Application Insights “Instrumentation Key” in JavaScript

This post on Application Insights and protecting your instrumentation key comes to us from Premier Developer consultant Adel Ghabboun. Application Insights instrumentation key can be used in both Server and client side. Using the instrumentation key in the server side is secured and no one can see it. The opposite happens on the client side…


Conquering the Upfront Cost Barrier to IoT

According to a recent report from the International Data Center (IDC), How government organizations look at IoT, the top three roadblocks to IoT deployment are upfront costs, security, and privacy.[1]  Over 30 billion devices are estimated to be connected to the internet by 2020.[2] The Internet of Things (IoT) can offer government agencies new and…


Unlock data insights to drive agency mission

Now more than ever, federal CIOs can leverage business intelligence (BI) and advanced analytics to simplify data management, unlock valuable insights, and use these insights to improve operations across their agencies. Advanced analytics allows CIOs to connect available data to their agency’s larger mission. Sophisticated tools and techniques enable CIOs to simultaneously extend the capabilities…


Homomorphic Encryption 101

In this article from his blog, Premier Developer consultant Razi Rais covers some of the basics of a powerful security & privacy tool – homomorphic encryption. I was recently exploring methods for improved privacy using various encryption schemes and stumbled upon Homomorphic Encryption that has a huge potential  in that area. I do feel that…

1