azure security center
11 TopicsIntroducing the Azure Threat Research Matrix
When performing a security assessment, it’s common to find the assessment team attribute their actions to the MITRE ATT&CK knowledge base so that high-level stakeholders can visually see what techniques were successful and defenders can understand the techniques that were performed. However, the commonly utilized MITRE knowledge base lacks formal documentation of Azure or AzureAD-related tactics, techniques, or procedures (TTPs) that assessment teams can attribute to. Over the past year, Microsoft has worked with some of the top Azure security researchers to create the Azure Threat Research Matrix (ATRM), a matrix that provides details around the tactics & techniques a potential adversary may use to compromise an Azure Resource or Azure Active Directory.28KViews7likes6CommentsAZ-500: Microsoft Azure Security Technologies Study Guide
The AZ-500 certification provides professionals with the skills and knowledge needed to secure Azure infrastructure, services, and data. The exam covers identity and access management, data protection, platform security, and governance in Azure. Learners can prepare for the exam with Microsoft's self-paced curriculum, instructor-led course, and documentation. The certification measures the learner’s knowledge of managing, monitoring, and implementing security for resources in Azure, multi-cloud, and hybrid environments. Azure Firewall, Key Vault, and Azure Active Directory are some of the topics covered in the exam.22KViews4likes3CommentsBuilding a Strong Foundation: Prioritizing Developer Security at Microsoft Build 2023
Join us at Microsoft Build 2023 as we shine a spotlight on Developer Security, an imperative in today's evolving threat landscape. Engage with our experts in informative sessions and discover how Azure's industry-leading defense in depth approach and the Secure Supply Chain Consumption Framework empower developers to build resilient applications. Don't miss this opportunity to enhance your knowledge, network with industry leaders, and elevate your understanding of secure software development. Register now for Microsoft Build and be part of the conversation.3.5KViews3likes2CommentsSecuring the Clouds: Achieving a Unified Security Stance and threat-based approach to Use Cases
Uncover the complexities of obtaining full observability for your complex multiple cloud environment by adopting a proven approach based on a Threat assessment. Stay ahead of adversaries with a threat-based approach able to contrast even the most tricky vulnerabilities, including Zero Days. Dive into strategies for creating the perfect system to detect attacks and respond to them. Authored by a team of experts, this series is your guide to establishing a comprehensive security posture in a multi-cloud environment. Explore now and transform your cloud security game! :briefcase::locked:3.9KViews2likes2CommentsSecuring the Clouds: Navigating Multi-Cloud Security with Advanced SIEM Strategies
Uncover the complexities of securing multiple clouds and the pitfalls of traditional SIEM tools in our latest blog series. Dive into strategies for achieving unified security with Microsoft's solutions, and gain strategic insights into the modern AI world. Stay ahead of adversaries with a threat-based approach. Authored by a team of experts, this series is your guide to establishing a comprehensive security posture in a multi-cloud environment. Explore now and transform your cloud security game! :briefcase::locked:4.8KViews2likes0CommentsImproving Server Vulnerability Management Efforts
Discover a new way to transform vulnerability management with Microsoft Defender for Servers, Azure Automation Services, and Azure Arc. This blog post will guide you through moving pass the traditional vulnerability management approach toward implementing an automated and streamlined process for your servers on-premises and the cloud. Seamlessly integrate various tools in a 5-step solution that will make you rethink server vulnerability management. Don't miss the opportunity to add a new weapon to your cyber security strategy that aims at removing inefficiencies.