Azure Key Vault is a service for storing securely certificates, credentials, connection strings, and more. In this article, Rishit Mishra walks through how to use the service to secure a connection string for an application.… Read more
As organisations move to cloud platforms like Azure and AWS, understanding security is more important than ever. In this article, Vasanth Makam explains what companies need to know to make sure their data is secure.… Read more
You can use SQL Audit to record changes to security, access to tables, and more to help you meet compliance requirements. In this article, Joshua Feierman explains how to set up the audit and collect the data in Azure Log Analytics when running SQL Server in an Azure VM.… Read more
Criminal activity is a growing menace on the internet. This inevitably means more diligence is required by legitimate users in the face of an increasingly sophisticated criminal threat. Robert Sheldon describes some of the emerging threats and risks.… Read more
Rick Rainey shows how you can incorporate checking group membership in Azure Active Directory Claims in the fourth edition of his series on JustAzure.… Read more
Rick Rainey provides an Introduction to Azure Active Directory in this first article in a series on the cloud user directory service from Microsoft.… Read more
Although Windows Azure can be used from the portal, it comes into its own once provisioning, deployments and maintenance can be automated or undertaken with specialized tools. To reach this stage, you need to understand Windows Azure Management Certificates. Mike Wood brings all this information into one article and guides you through the process. … Read more
The cloud isn't any more, or less, inherently secure than any other platform. To be confident that your cloud data is secure, there are several precautions you can take, as Ming describes.… Read more
Windows Azure Access Control Service can be used to integrate your application's authentication and authorization logic with whatever Identity providers you wish, as long as they support one of the security protocols that the service understands… Read more