The Microsoft Cloud Blog

Expert insights on Microsoft Azure, Cloud Architecture, and Enterprise Technology

security

19 articles

Trust Undermined: How Fake Developer Interviews Are Becoming a Stealthy Malware Delivery Channel

Trust Undermined: How Fake Developer Interviews Are Becoming a Stealthy Malware Delivery Channel

Contagious Interview: Malware delivered through fake developer job interviews The intersection of recruitment and cybersecurity has rarely been as fraught as it is today. Recent research from Microsoft Defender Experts exposes a campaign that weaponises the very workflows meant to identify and onboard technical talent. The so-called “Contagious Interview” operation, active since at least December… Continue Reading →

Read article
Reimagining Software Security: Microsoft’s SDL Approach for the Age of AI

Reimagining Software Security: Microsoft’s SDL Approach for the Age of AI

Read the source article: Microsoft SDL: Evolving security practices for an AI-powered world The rapid integration of artificial intelligence into enterprise operations is fundamentally altering how we think about software security. Having spent years guiding organisations through digital transformation, I recognise that conventional approaches to secure development are struggling to keep pace with the complexity… Continue Reading →

Read article
Proactive Cyber Defence in Government: Microsoft’s Evolving Approach to Trust and Security

Proactive Cyber Defence in Government: Microsoft’s Evolving Approach to Trust and Security

When Satya Nadella discusses the importance of trust in technology, especially within the realm of governmental data protection, I see a direct alignment with the strategic trajectory outlined in Microsoft’s latest Deputy CISO blog. Tim Langan, Microsoft’s Deputy Chief Information Security Officer for Government and Trust, provides a compelling perspective on the complexity and urgency… Continue Reading →

Read article
Verifying Trust: How Argos Elevates Reliability in Multimodal AI Agents

Verifying Trust: How Argos Elevates Reliability in Multimodal AI Agents

In my work with cloud and AI technology leaders, the conversation often turns to how we can align increasingly powerful AI agents with the real-world environments they are meant to serve. The latest research from Microsoft introduces Argos, a verification framework that directly addresses a growing pain point: ensuring multimodal reinforcement learning (RL) models are… Continue Reading →

Read article
Preparing for 2026: Adapting Identity and Network Security to the Age of AI Agents

Preparing for 2026: Adapting Identity and Network Security to the Age of AI Agents

Artificial intelligence is reshaping both the defensive and offensive sides of cybersecurity. As I look at the challenges facing organisations in 2026, it is clear that identity and network access are at the centre of this transformation. The recent article from Microsoft outlines four strategic priorities for security leaders, each reflecting the reality that AI—particularly… Continue Reading →

Read article
Navigating the Evolving Threat Landscape: Phishing, Spoofing, and the Critical Role of Identity Infrastructure

Navigating the Evolving Threat Landscape: Phishing, Spoofing, and the Critical Role of Identity Infrastructure

The continual evolution of phishing tactics reflects a broader shift in cyber threat sophistication, with attackers now exploiting the very infrastructure that underpins digital trust. In recent research published by Microsoft Threat Intelligence, I see clear evidence that malicious actors are leveraging complex email routing and subtle domain misconfigurations to craft convincing spoofed emails. These… Continue Reading →

Read article
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack

Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack

Understanding the Shai-Hulud 2.0 Threat Landscape Microsoft’s recent research into the Shai-Hulud 2.0 supply chain attack presents a sobering reminder of how adversaries continue to evolve their tactics. The article is clear in its technical detail, focusing on detection strategies, investigation workflows, and defence mechanisms across Microsoft’s security product portfolio. From my perspective, this incident… Continue Reading →

Read article
Microsoft Announce New Agents for Security Copilot and additional features for Securing AI and AI for Security

Microsoft Announce New Agents for Security Copilot and additional features for Securing AI and AI for Security

I assume everyone interested in Microsoft Security has seen yesterday’s announcement regarding the availability of new agents in Security Copilot. I found two announcements that I found particularly interesting towards the end of the post. Firstly, the release of some tools in Microsoft Entra to help mitigate against the risks associated with ‘Shadow AI’, a… Continue Reading →

Read article
The Importance of Cybersecurity in Cloud Migrations

The Importance of Cybersecurity in Cloud Migrations

One of the benefits of being on the autistic spectrum is that ideas tend to linger in my mind far longer than they probably should. As a result, I am still quite obsessed with The Stack article (https://www.thestack.technology/warren-buffetts-geico-repatriates-work-from-the-cloud-continues-ambitious-infrastructure-overhaul/) I read about a month ago, which discussed cloud repatriation. It provided an example from Geico, where… Continue Reading →

Read article
Cloudy With a Chance of Insights | EP04

Cloudy With a Chance of Insights | EP04

The latest episode of our little side project, Cloudy with a Chance of Insights, is out and available on YouTube, Apple Podcast and all good podcast platforms. This week, we discuss our highlights from 2024 and what we are looking forward to in the Microsoft Cloud for 2025. As usual, our topics meander through the… Continue Reading →

Read article
Page 1 of 2Next →