Welcome to the second installment in our series on transparency at the Microsoft Security Response Center (MSRC). In this ongoing discussion, we discuss our commitment to […]
Introduction Integrating Azure Kubernetes Service (AKS) with Keycloak through Azure Active Directory (Azure AD) as an intermediary leverages Azure AD’s support for OpenID Connect (OIDC) […]
The post Congratulations to our Partner of the Year Award winners! Thank you for everything you are doing to ensure the benefits of this next generation […]
This article describes the features of Azure Resource Manager that are useful when you work with multitenanted systems, and it provides links to guidance and examples […]
Last year at BUILD we announced the public preview of the Network Observability add-on. Today we’re excited to share a massive upgrade to the network observability […]
The Intel Foundry Accelerator United States Military, Aerospace, and Government (USMAG) Alliance pulls together Intel Foundry’s leading-edge process capabilities with trusted partners in EDA, IP, and […]
In line with our commitment to provide seamless and efficient experiences for Azure Virtual Desktop users, we’ve recently implemented Preferred app group type—an enhancement that improves […]
In generative AI, jailbreaks, also known as direct prompt injection attacks, are malicious user inputs that attempt to circumvent an AI model’s intended behavior. A successful […]
I serve on the board of a publicly traded company. I fostered the creation of the board’s cybersecurity committee and I co-lead it. I’ve reflected on […]