1 Dec 2021 6:55am, by Jonas Iggbom Curity sponsored this post.    The concept of a zero trust architecture (ZTA) has been around for a while. However, in practice, zero trust implementations have been moving at a pretty slow pace. Maybe that’s not all that strange, given that a comprehensive ZTA is a big task, and the …

By Alex Weinert Published Nov 30 2021 09:00 AM  7,977 Views   We hope you enjoyed Ignite 2021! We loved hearing from you and learning how you’re using Azure Active Directory to implement Zero Trust to protect users and applications from threats. Many of you have asked for more empowering and easier to use tools for protection …

(Posted on 2 August, 2021 Mark Russinovich Chief Technology Officer and Technical Fellow, Microsoft Azure)   “Throughout our Advancing Reliability blog series we’ve explained various techniques used by the Azure platform to prevent technical issues from impacting customers’ virtual machines (VMs) or other resources—like host resiliency with Project Tardigrade, cautious safe deployment practices taking advantage of ML-based AIOps insights, as well as predicting …

(Posted on 13 July, 2021 Michael Aldridge  Program Manager II) Securely manage remote connectivity at scale Security is at the forefront of user and administrator connectivity to cloud services. As enterprises continue to move mission-critical applications to the cloud, the need for secure, scalable, and reliable remote public connectivity and jumpbox services increases. With this shift, enterprises …

Microsoft Digital is verifying identity across the environment to support a Zero Trust security model that informs how Microsoft protects its customers, data, employees, and business in an increasingly complex and dynamic digital world. EXPLORE RELATED CONTENT  Microsoft Digital, the organization that is powering, protecting, and transforming Microsoft, is verifying identity across the environment to …