In the U.S. alone, 4.6 million IT workers supervise security, manage software, and process data to streamline information for organizations of all sizes. This current period has been called the Fourth Industrial Revolution, and it has led to massive changes in the ways we live and work. In this in-depth article from the New York Times, look at how the IT industry is looking to cloud technology to modernize and revolutionize.

Read More…

Cloud security is a fundamentally new landscape for some organizations. While many of the security principles remain the same as on-premises, the implementation is often very different. This overview provides a snapshot of the five best practices for cloud security: identity and access control, security posture management, apps and data security, threat protection, and network security.

View: Five best practices for cloud security

This article introduces secure score, which is the central feature in Security Center that helps you understand your current security situation as well as how to efficiently and effectively improve it. It provides detailed guidance on how to access your score, how it is calculated, how to improve it, and more.

Read More…

This blog outlines  the different methods of data migration and use cases.  Your method of migrating data to the cloud will depend on many factors. Migrating large amounts of data can be done with  any of the  methods explained in the blog, including  Azure Data Box, File Shares, Site Recovery service,  and more.

Read More…