{"id":14574,"date":"2018-10-02T16:15:21","date_gmt":"2018-10-02T16:15:21","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=85804"},"modified":"2018-10-02T16:15:21","modified_gmt":"2018-10-02T16:15:21","slug":"ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/","title":{"rendered":"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more"},"content":{"rendered":"<p>What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. For all of us here at Microsoft who get to work on security, spending time with customers to learn how you are using our security products today and to share new innovations to come is a highlight. At this year\u2019s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than one hundred focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security. I was chuffed to see that our security booths at the center of the expo hall were chock-a-block for the whole event. Thank you to everyone who stopped by, attended our social and community events, and connected with our engineers and product managers.<\/p>\n<p>After their <a target=\"_blank\" href=\"https:\/\/twitter.com\/BenThePCGuy\/status\/986303566183739392\" rel=\"noopener\">security blanket<\/a> work at the RSA Conference earlier this year, our social team once again took a shot at \u201cpeak swag.\u201d Our \u201cSecurity SOCs\u201d were the result, lovingly designed and then crafted from the finest combed cotton, bringing fashion together with a six-month Enterprise Mobility + Security trial\u2014quite the combination.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85819\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image.jpg\" alt=\"\" width=\"715\" height=\"715\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image.jpg 715w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-150x150.jpg 150w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-300x300.jpg 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-250x250.jpg 250w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-330x330.jpg 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-400x400.jpg 400w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-32x32.jpg 32w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-50x50.jpg 50w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-64x64.jpg 64w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-96x96.jpg 96w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/10\/Ignite-2018-highlights-image-128x128.jpg 128w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\"\/><\/p>\n<p><em>Show us your own fashion moment through <a target=\"_blank\" href=\"https:\/\/twitter.com\/msftsecurity\/status\/1045318159425818624\" rel=\"noopener\">social media<\/a> with #askmeaboutmySOC #showmeyourSOC.<\/em><\/p>\n<p>More seriously, if you weren\u2019t able to join us this year, or found yourself trading off between sessions or workshops at the show, don\u2019t worry, our breakout sessions on security are <a href=\"https:\/\/myignite.techcommunity.microsoft.com\/videos\">available on-demand<\/a>. At Ignite 2018, we also brought a deep lineup of new security innovations that I have summarized below, along with some top session recommendations:<\/p>\n<h3>Identity and access management<\/h3>\n<p>We <em>really<\/em> don\u2019t like passwords, so together we want to help you eliminate their use through simpler, more secure alternatives. New support for passwordless sign-in to Azure Active Directory (Azure AD) connected apps\u2014both cloud and on-premises\u2014through the Microsoft Authenticator app can help you replace passwords with a more secure, multi-factor sign-in that can reduce compromise by 99.9 percent and significantly simplify the user experience. Watch the Ignite session: <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/64557#ignite-html-anchor\" rel=\"noopener\">Getting to a world without passwords<\/a>.<\/p>\n<p>We also announced two powerful new features in our set of identity governance capabilities for Azure AD to help automate the process of granting access to employees and partners: Entitlement Management and My Access. Watch the Ignite session: <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/64564#ignite-html-anchor\" rel=\"noopener\">Govern access to your resources with Azure AD identity governance<\/a>. And read more about <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/Azure-Active-Directory-Identity\/Announcing-password-less-login-identity-governance-and-more-for\/ba-p\/262472\" rel=\"noopener\">identity and access management announcements<\/a>.<\/p>\n<h3>Information protection<\/h3>\n<p>As you move more of your workloads to the cloud, meeting information security and compliance standards needs a new approach. Azure is the first cloud platform to offer confidentiality and integrity of data while in use\u2014adding to the protections already in place that help keep your data secure in transit and at rest. <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-confidential-computing\/\" rel=\"noopener\">Azure confidential computing benefits<\/a> are available soon on a new DC series of virtual machines in Azure, enabling trusted execution environments using Intel SGX chipsets to protect data while it\u2019s being computed. Watch the Ignite session: <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/66998#ignite-html-anchor\" rel=\"noopener\">Protection by design: Intel SGX and Azure Confidential Computing<\/a>.<\/p>\n<p>We\u2019ve also rolled out a new unified labeling experience in the Security &amp; Compliance Center in Microsoft 365 that delivers a single, integrated approach to creating data sensitivity and data retention labels. You can preview new labeling capabilities that are built into Office apps across all major platforms and new extensions of labeling and protection capabilities to include PDFs. <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/Microsoft-Information-Protection\/Microsoft-Information-Protection-SDK-Now-Generally-Available\/ba-p\/263144\" rel=\"noopener\">The Microsoft Information Protection SDK<\/a>, now generally available, enables other software creators to enhance and build applications that understand, apply, and act on Microsoft sensitivity labels so you can have more cohesive information protection. <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/Announcing-availability-of-information-protection-capabilities\/ba-p\/261967\" rel=\"noopener\">Read more<\/a> about the information protection announcements and <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/64283#ignite-html-anchor\" rel=\"noopener\">watch the Ignite session<\/a>.<\/p>\n<h3>Threat protection<\/h3>\n<p>Microsoft Threat Protection, announced at Ignite last week, is an integrated experience for detection, investigation, and remediation across endpoints, email, documents, identity, and infrastructure. This new integration in the Microsoft 365 admin console combines signal across all of Office 365 Advanced Threat Protection (ATP), Windows Defender ATP, Microsoft Cloud App Security, Azure AD Identity Protection, and the Azure Security Center to help you secure across your digital estate. The portal not only provides alerts and monitoring of threats, but also gives you the ability to make real-time policy changes to help your security strategy stay ahead of changing threats. <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\" rel=\"noopener\">Read more<\/a> about Microsoft Threat Protection or <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/64344?source=sessions#ignite-html-anchor\" rel=\"noopener\">watch the Ignite session<\/a>.<\/p>\n<p>Microsoft Cloud App Security can now leverage the traffic information collected by Windows Defender Advanced Threat Protection about the cloud apps and services being accessed from IT-managed Windows 10. This native integration provides admins a more complete view of cloud usage in their organization and easier investigative work. <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/What-s-new-with-Microsoft-Cloud-App-Security-MS-Ignite-edition\/ba-p\/262676\">Read more<\/a> about this integration or <a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/65781?source=sessions#ignite-html-anchor\">watch the Ignite session<\/a>.<\/p>\n<h3>Security management<\/h3>\n<p>To help you strengthen your security posture, you\u2019ll want to understand your current position and where to go from there. Microsoft Secure Score is the only dynamic report card for cybersecurity. Organizations that use the Secure Score assessments and recommendations typically reduce their chance of a breach by 30-fold. Microsoft Secure Score provides guidance to improve your security posture. For example, Secure Score can recommend taking steps to secure your admin accounts with Multi-Factor Authentication (MFA), secure users\u2019 accounts with MFA, and turn off client-side email forwarding rules. Starting today, we\u2019re expanding Secure Score to cover all of Microsoft 365. We are also introducing Secure Score for hybrid cloud workloads in the Azure Security Center, so you can have full visibility across your organization\u2019s entire estate. <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/New-controls-available-in-Microsoft-Secure-Score\/ba-p\/261050\" rel=\"noopener\">Read more<\/a> about Microsoft Secure Score or <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/64332?source=sessions#ignite-html-anchor\" rel=\"noopener\">watch the Ignite session<\/a>.<\/p>\n<h3>Unified endpoint management<\/h3>\n<p>Customers using System Center Configuration Manager and Microsoft Intune to manage their existing infrastructure benefit immediately from the scale, reliability, and security of the cloud. We announced new capabilities for unified endpoint management (UEM) at Ignite to empower IT to secure your data across a variety of devices and platforms, and to help you deliver intuitive and native user experiences for Windows 10, iOS, and Android devices. <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/What-s-New-with-Microsoft-Intune-and-System-Center-Configuration\/ba-p\/262542\" rel=\"noopener\">Read more<\/a> about all the UEM advancements or <a target=\"_blank\" href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/64592?source=sessions#ignite-html-anchor\" rel=\"noopener\">watch the Ignite session<\/a>.<\/p>\n<h3>Looking ahead<\/h3>\n<p>Working closely with customers is at the center of our ability to innovate and evolve our security technologies. Ignite is a top-notch opportunity to build security community. It doesn\u2019t stop there though. We are <em>always<\/em> interested in your feedback as we roll out new capabilities\u2014do join us and have your voice heard via the <a target=\"_blank\" href=\"https:\/\/techcommunity.microsoft.com\/\" rel=\"noopener\">Tech Community<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/02\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year&#8217;s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security.<br \/>\nThe post Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more appeared first on Microsoft Secure. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-14574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-02T16:15:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"715\" \/>\n\t<meta property=\"og:image:height\" content=\"715\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more\",\"datePublished\":\"2018-10-02T16:15:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\"},\"wordCount\":1063,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\",\"name\":\"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg\",\"datePublished\":\"2018-10-02T16:15:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg\",\"width\":715,\"height\":715},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/","og_locale":"en_US","og_type":"article","og_title":"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-02T16:15:21+00:00","og_image":[{"width":715,"height":715,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more","datePublished":"2018-10-02T16:15:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/"},"wordCount":1063,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/","url":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/","name":"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg","datePublished":"2018-10-02T16:15:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more.jpg","width":715,"height":715},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ignite-2018-highlights-passwordless-sign-in-confidential-computing-new-threat-protection-and-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14574"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14574\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14575"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}