Our Latest News
Viva Learning news and feature update
As we celebrate the first year of Microsoft Viva, it’s exciting to see so many companies seeking to foster human connection, align on a sense of mission, ensure employee wellbeing, and retain their best people. These are areas of critical important for business of any...
FBI Releases Indicators of Compromise for RagnarLocker Ransomware
The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with ransomware attacks by RagnarLocker, a group of a ransomware actors targeting critical infrastructure sectors.CISA encourages users and...
CISA Releases Security Advisory on PTC Axeda Agent and Desktop Server
CISA has released an Industrial Controls Systems Advisory (ICSA), detailing vulnerabilities in PTC Axeda agent and Axeda Desktop Server. Successful exploitation of these vulnerabilities—collectively known as “Access:7”—could result in full system access, remote code...
LGBTQ+ community: The FTC wants to hear from you
This National Consumer Protection Week (NCPW), we’re focused on how scams affect every community — including the LGBTQ+ community. Scammers often like to impersonate familiar people, organizations, and companies that we know and trust. For the LGBTQ+ community, that...
Protegendo o backend com Azure API Management
Protegendo o backend com o Azure API Management O Azure API Management é uma excelente opção para projetos que lidam com APIs. Estratégias como centralização, monitoria, gerenciamento e documentação são características que o APIM ajuda você a...
This NCPW, help reach every community
We know scammers target people everywhere. So this National Consumer Protection Week, we’re focusing on how fraud affects every community. In blog posts and events this week, we’ll highlight scams that affect some of those communities, including older adults, college...
Build high confidence migration plans using Azure Migrate
Build high confidence migration plans using Azure Migrate’s software inventory and agentless dependency analysis Authored by Vikram Bansal, Senior PM, Azure Migrate Migrating a large & complex IT environment from on-premises to the cloud can be quite...
Using secretless Azure Functions from within AKS
I recently implemented a change in KEDA (currently evaluated as a potential pull request), consisting of leveraging managed identities in a more granular way, in order to adhere to the least privilege principle. While I was testing my changes, I wanted to use managed...
Kurbo by WW charged with collecting kids’ personal info without parents’ permission
Advertised as a weight management service for kids, teens, and families, the Kurbo by WW app and website let kids as young as 8 track their weight, food intake, activity, and more. The problem? Many parents didn’t know their kids were using it, while the app and...
Microsoft Defender for Cloud Price Estimation Dashboard
Microsoft Defender for Cloud provides advanced threat detection capabilities across your cloud workloads. This includes comprehensive coverage plans for compute, PaaS and data resources in your environment. Before enabling Defender for Cloud across subscriptions,...
Spilling the tea on the latest COVID-19 cure claim
Wouldn’t it be nice if all you had to do to get rid of COVID-19 was drink some tea? Well, selling people easy, feel good products — without competent scientific evidence — is something scammers are good at — and the FTC is working aggressively to stop them. In...
NSA Releases Network Infrastructure Security Guidance
The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats....



Recent Comments