Latest Blog Articles
This forth article in our series builds on the main overview (“Strategy to Execution: Operationalizing Microsoft Defender CSPM”). Here, we focus on embedding security directly into DevOps workflows u...
Mar 06, 2025752Views
0likes
0Comments
What's new in Defender for Cloud?
On-demand malware scanning in Defender for Storage is now in GA! This feature also supports blobs up to 50 GB in size (previously limited to 2GB). See this page fo...
Mar 04, 2025433Views
2likes
0Comments
In today’s digital landscape, containerization is essential for modern application development, but it also expands the attack surface with risks like vulnerabilities in base images, misconfiguration...
Mar 04, 2025293Views
2likes
0Comments
Introduction
This is the third article in our blog series, “Strategy to Execution: Operationalizing Microsoft Defender CSPM.” If you’re new to the series, or want a more holistic view of strategic ...
Feb 25, 2025883Views
2likes
0Comments
Security compliance across multicloud environments is challenging due to the diversity and complexity of platforms. Each cloud provider—whether AWS, Azure, Google Cloud, or others—has its own securit...
Feb 19, 20251.2KViews
2likes
0Comments
Understanding Jailbreak attacks
Evasion attacks involve subtly modifying inputs (images, audio files, documents, etc.) to mislead models at inference time, making them a stealthy and effective mean...
Feb 18, 20251.2KViews
1like
0Comments
The cloud security landscape is constantly evolving and securing containerized environments including Kubernetes is a critical piece of the puzzle.
Kubernetes environments provide exceptional flex...
Feb 07, 2025798Views
6likes
0Comments
What's new in Defender for Cloud?
Baseline Linux feature has been updated to improve its accuracy and coverage. For more information, please visit this page.
Container vulnerability assessment ...
Feb 04, 2025617Views
0likes
0Comments
API security posture management is now natively integrated into Defender CSPM and available in public preview at no additional cost. This integration provides comprehensive visibility, proactive API ...
Jan 30, 20251.4KViews
1like
0Comments
4 MIN READ
Modern enterprises operate at a breakneck pace, building applications that rely heavily on open-source dependencies while running workloads in complex, multi-cloud environments. Securing these applic...
Jan 30, 2025788Views
0likes
0Comments
Resources
Tags
- cloud security140 Topics
- cloud security posture management136 Topics
- workload protection71 Topics
- threat protection55 Topics
- container security53 Topics
- Microsoft Defender for Servers46 Topics
- best practices44 Topics
- vulnerabilities43 Topics
- devops36 Topics
- microsoft defender for storage30 Topics