Browse All Security Content (270)
aayodeji covers the major upgrades in Azure Managed Grafana 12, highlighting new Entra authentication, faster Azure Monitor log query workflows, Prometheus metric improvements, and streamlined database monitoring for Azure environments.
Microsoft Developer introduces computer use agents, outlining what they are, how they function, their types, and related security risks. This video provides foundational knowledge for those interested in AI agents and security.
JeevanManoj presents an in-depth guide to the public preview of Entra ID-based access for Azure Blob Storage SFTP, highlighting enhanced enterprise identity management and security.
FeynmanZhou highlights Azure Container Registry's new proactive health monitoring and auto-communication features, empowering teams to integrate ACR outage alerts and diagnostics seamlessly into their DevOps and incident workflows.
stclarke summarizes Microsoft's latest email security benchmark, revealing detailed statistics on threat detection and the benefits of integrating Defender with partner solutions for layered protection.
Microsoft Threat Intelligence and Microsoft Defender Experts detail how Storm-2561 uses SEO poisoning to distribute fake, signed VPN clients, stealing user credentials through technical deception and advanced evasion techniques.
Allison reports on a significant update to GitHub Actions OIDC token functionality: repository custom properties can now be added as claims, supporting stronger and more flexible policy controls across major cloud providers.
Microsoft Incident Response presents a comprehensive analysis of prompt abuse in AI tools, offering practical mitigation strategies and demonstrating how to leverage Microsoft’s security stack to detect, investigate, and respond to such incidents.
Laura Jiang details a temporary rollback in Azure DevOps allowing build identities to access Advanced Security APIs again. The post outlines the required actions for teams before the restrictions return in April 2026.
Microsoft Defender Experts and the Microsoft Defender Security Research Team expose the Contagious Interview campaign, detailing how fake technical interviews target developers with malware. Their research highlights attack methods, malware payloads, and practical protection strategies.
DevClass.com reports on how Microsoft Azure CTO Mark Russinovich used Anthropic’s Claude Opus 4.6 AI model to scan 1986 Apple II machine code, finding security vulnerabilities and raising important points about AI’s expanding role in legacy code security.
Allison summarizes the March 2026 updates to GitHub's secret scanning, focusing on new detectors—including Azure and major third-party tokens—expanded push protection, and added validation for various providers.
Rahul Bhandari (MSFT) and Tara Overfield summarize important security fixes and servicing information for .NET and .NET Framework with the March 2026 update, including CVE resolutions and detailed changelogs.
Allison provides an overview of CodeQL 2.24.3's new features, with an emphasis on Java 26 support, improved multi-language coverage, and static security enhancements for GitHub code scanning users.
Sanchit Mehta presents a detailed look at how the Azure SRE Agent autonomously investigates and resolves incidents, often identifying and fixing its own issues. The post explains how architectural choices—like filesystem workspaces and context layering—make these advanced AI-driven capabilities possible.
Dalibor_Kovacevic demonstrates how to effectively onboard the Azure SRE Agent for real-world apps, showing the practical steps needed to deliver actionable insights and better incident response in cloud environments.
SamhithaGurumurthy delivers a thorough step-by-step guide for migrating on-premises Windows and Linux VMs to Azure Confidential Virtual Machines with Azure Migrate, emphasizing secure architecture, disk encryption, attestation, and enterprise governance.
Vineela-Suri shares a detailed guide on implementing Agent Hooks within Azure SRE Agent, covering governance, safety, and auditing practices for automating incident response—including hands-on configuration to prevent unsafe operations and maintain compliance.
PramodPalukuru demonstrates how to create hardened, reusable custom images for Azure Confidential Virtual Machines, guiding you through secure image creation, compliance with PMK and CMK, and enterprise deployment using Azure Compute Gallery.
Coryskimming from Microsoft introduces the packed line-up for Azure at KubeCon Europe 2026, spotlighting hands-on AKS labs, AI/ML workload sessions, security, cloud-native DevOps practices, and open-source solutions from Microsoft's top engineers.