Browse All Security Content (277)

wanjing presents a hands-on walkthrough for Java developers deploying on Azure Functions (Linux), showing how to configure JVM truststores for self-signed certificates and discussing practical deployment and security considerations.
CommunityApplication ConfigurationAzureAzure App ServiceAzure FunctionsAzure Key Vault+15 more
Allison provides an in-depth overview of the GitHub Enterprise Server 3.20 release candidate, breaking down new security, DevOps, and collaboration features for enterprise development teams.
NewsAdvanced SecurityAPIBackup ServiceCode SecurityCollaboration+13 more
Allison details the CodeQL 2.24.2 release, highlighting expanded language support, security query updates for Microsoft technologies, and improved detection accuracy for DevOps and security teams.
NewsApplication SecurityAzure SDKC#CodeQLCross Site Request Forgery+14 more

Malicious Next.js Repositories Used in Developer-Targeting Attack: RCE and C2 via Build Workflows

Microsoft Defender Experts and the Security Research Team provide an in-depth report on a developer-targeted campaign using malicious Next.js repositories that exploit common coding workflows. The analysis details how attackers achieve remote code execution and persistent C2, with actionable security guidance.
NewsAdvanced HuntingAttack Surface ReductionAzureBuild SecurityC2 Infrastructure+20 more
In this video, Microsoft Developer explains how to use Microsoft Entra ID Access Packages for automated, scalable access governance, emphasizing risk reduction and Zero Trust security.
VideosAccess AutomationAccess ManagementAccess PackagesAzure ADCloud Computing+13 more
Microsoft Developer presents a comprehensive demo on securing AI agents built with Azure AI Foundry, demonstrating practical zero trust strategies and Azure-native security controls.
VideosAgent HardeningAgent SecurityAIAI AgentsAudit Trail+20 more
Microsoft Developer discusses how organizations can secure AI adoption using Data Security Posture Management (DSPM) for AI, focusing on protection and compliance in enterprise environments.
VideosAIAI GovernanceAI MonitoringAI SecurityChatGPT+19 more
Microsoft Developer demonstrates how Microsoft Security Copilot leverages AI to help security teams triage and remediate real-world incidents, improving the speed and effectiveness of SecOps workflows.
VideosAIAI AssistanceAlert TriageCloud ComputingCybersecurity+16 more
stclarke details Microsoft's new Sovereign Cloud capabilities, highlighting how Azure Local, Foundry Local, and Microsoft 365 Local enable secure, governed, and AI-powered operations in fully disconnected, sovereign environments.
NewsAIAzureAzure GovernanceAzure LocalCloud Security+15 more
stclarke reports on Microsoft’s announcement of new Sovereign Cloud capabilities, enabling organizations to host productivity and AI workloads in fully disconnected, locally controlled environments.
NewsAIAI ModelsAzureCloud GovernanceCloud Security+15 more
Andrew Conway examines how security teams can leverage Microsoft Defender’s autonomous defenses and expert-led services to modernize SOCs, leveraging AI and expert input for improved cyber resilience.
NewsAIAI in SecurityAutonomous DefenseCyber ResilienceCyberthreats+13 more
rickliev presents a detailed breakdown of the latest evolution in Microsoft’s Network Operations Agent Framework, showcasing how agentic AI, Azure, and robust governance drive real-world autonomous network operations for the telecommunications industry.
CommunityAgentic AIAIAzureCommunityDevOps+17 more
Allison highlights how GitHub Enterprise Cloud's IP allow list now extends to Enterprise Managed User namespaces, providing unified network access control for organizations.
NewsAccess ControlAPI SecurityDevOpsEnterprise AdministrationEnterprise Managed Users+10 more

Agent 365 and Agent ID Overview

John Savill provides an in-depth overview of Agent 365 and Agent ID, demonstrating how Microsoft Entra, Purview, and Defender facilitate secure, productive agent-based environments in the Azure cloud.
VideosA365Agent 365Agent BlueprintAgent IDAgent User+17 more
rgarofalo breaks down how Azure Application Gateway for Containers enables secure, scalable ingress and Layer-7 traffic management for containerized workloads, highlighting managed security, automation, and Kubernetes-native operations.
CommunityAKSAzureAzure Application Gateway For ContainersAzure Managed ServiceAzure Networking+18 more
Welcome to this week’s tech summary, where automation and agent technology continue to influence development practices. GitHub Copilot now provides greater support for autonomous workflows and AI model integrations, making it easier for teams to boost productivity across development environments. Microsoft Foundry and Azure add new features for multi-language agent orchestration, platform reliability, and secure migration—delivering the foundation for scalable agent-driven cloud projects. Updated tools and security practices help teams streamline workflow, improve compliance, and collaborate more effectively on open source and enterprise solutions.
RoundupsAIAI AgentsAI ModelsAzureCI/CD+14 more
In this workshop summary, DevClass.com reviews Martin Fowler’s event marking 25 years since the Agile Manifesto, highlighting the growing impact of AI on coding, the renewed importance of TDD, and security risks in software development.
BlogsAgile ManifestoAIAI Coding AgentsAI DevelopmentAutomated Testing+15 more
samcogan provides a practical migration guide for moving from a standalone Nginx Ingress controller to the Azure AKS App Routing add-on, outlining zero-downtime techniques and actionable advice for long-term Kubernetes ingress strategy.
CommunityAKSApp Gateway For ContainersApp Routing Add OnAzureAzure Key Vault+14 more
dbandaru demonstrates how to develop and deploy a Python-based SSL certificate monitoring tool within Azure SRE Agent, empowering teams to automate certificate health audits and avert service disruptions due to expired certificates.
CommunityAzureAzure AutomationAzure SRE AgentCertificate ExpiryCloud Monitoring+15 more
Adi Shua Zucker presents a maturity-based guide from Microsoft for developing proactive defense strategies using Microsoft Security Exposure Management, offering practical steps and insights for security professionals.
NewsAttack SurfaceCloud SecurityCybersecurityExposure ManagementIncident Response+12 more

Rejoining the server...

Rejoin failed... trying again in seconds.

Failed to rejoin.
Please retry or reload the page.

The session has been paused by the server.

Failed to resume the session.
Please reload the page.