{"id":35063,"date":"2020-05-19T15:00:44","date_gmt":"2020-05-19T15:00:44","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91118"},"modified":"2020-05-19T15:00:44","modified_gmt":"2020-05-19T15:00:44","slug":"microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/","title":{"rendered":"Microsoft Build brings new innovations and capabilities to keep developers and customers secure"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/SUR20_Book3_Contextual_0337.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>As both organizations and developers adapt to the new reality of working and collaborating in a remote environment, it\u2019s more important than ever to ensure that their experiences are secure and trusted. As part of this week\u2019s Build virtual event, we\u2019re introducing new Identity innovation to help foster a secure and trustworthy app ecosystem, as well as announcing a number of new capabilities in Azure to help secure customers.<\/p>\n<h3>New Identity capabilities to help foster a secure apps ecosystem<\/h3>\n<p>As organizations continue to adapt to the new requirements of remote work, we\u2019ve seen an increase in the deployment and usage of cloud applications. These cloud applications often need access to user or company data, which has increased the need to provide strong security not just for users but applications themselves. Today we are announcing several capabilities for developers, admins, and end-users that help foster a secure and trustworthy app ecosystem:<\/p>\n<ol>\n<li><strong>Publisher Verification<\/strong> allows developers to demonstrate to customers, with a verified checkmark, that the application they\u2019re using comes from a trusted and authentic source. Applications marked as publisher verified means that the publisher has verified their identity through the verification process with the Microsoft Partner Network (MPN) and has associated their MPN account with their application registration.<\/li>\n<li><strong>Application consent policies<\/strong> allow admins to configure policies that determine which applications users can consent to. Admins can allow users to consent to applications that have been Publisher Verified, helping developers unlock user-driven adoption of their apps.<\/li>\n<li><strong>Microsoft authentication libraries (MSAL)<\/strong> for Angular is generally available and our web library identity.web for ASP.NET Core is in public preview. MSAL make it easy to implement the right authentication patterns, security features, and integration points that support any Microsoft identity\u2014from Azure Active Directory (Azure AD) accounts to Microsoft accounts.<\/li>\n<\/ol>\n<p>In addition, we\u2019re making it easier for organizations\u202fand developers to\u202fsecure,\u202fmanage\u202fand build apps that connect with different types of users outside an organization with <strong>Azure AD External Identities now in preview<\/strong>. With Azure AD External Identities, developers can build flexible, user-centric experiences that enable self-service sign-up and sign-in and allow continuous customization without duplicating coding effort.<\/p>\n<p>You can learn even more about our Identity-based solutions and additional announcements by heading over to the Azure Active Directory Tech Community blog and reading <a href=\"https:\/\/aka.ms\/identityatbuild2020\" target=\"_blank\" rel=\"noopener noreferrer\">Alex Simons\u2019 post<\/a>.<\/p>\n<h3>Azure Security Center innovations<\/h3>\n<p>Azure Security Center is a unified infrastructure security management system for both Azure and hybrid cloud resources on-premises or in other clouds. We\u2019re pleased to announce two new innovations for Azure Security Center, both of which will help secure our customers:<\/p>\n<p>First, we\u2019re announcing that the Azure Secure Score API is now available to customers, bringing even more innovation to Secure Score, which is a central component of security posture management in Azure Security Center. The recent enhancements to Secure Score (in preview) gives customers an easier to understand and more effective way to assess risk in their environment and prioritize which action to take first in order to reduce it.&nbsp; It also simplifies the long list of findings by grouping the recommendations into a set of Security Controls, each representing an attack surface and scored accordingly.<\/p>\n<p>Second, we\u2019re announcing that suppression rules for Azure Security Center alerts are now publicly available. Customers can use suppression rules to reduce alerts fatigue and focus on the most relevant threats by hiding alerts that are known to be innocuous or related to normal activities in their organization. Suppressed alerts will be hidden in Azure Security Center and Azure Sentinel but will still be available with \u2018dismissed\u2019 state. You can learn more about suppression rules by visiting <a href=\"https:\/\/docs.microsoft.com\/azure\/security-center\/alerts-suppression-rules\" target=\"_blank\" rel=\"noopener noreferrer\">Suppressing alerts from Azure Security Center\u2019s threat protection<\/a>.<\/p>\n<h3>Azure Disk Encryption and encryption &amp; key management updates<\/h3>\n<p>We continue to invest in encryption options for our customers. Here are our most recent updates:<\/p>\n<ol>\n<li>Fifty more Azure services now support customer-managed keys for encryption at rest. This helps customers control their encryption keys to meet their compliance or regulatory requirements. The full list of services is <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/encryption-atrest#encryption-model-and-key-management-table\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. We have now made this capability part of the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/benchmarks\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Security Benchmark<\/a>, so that our customers can govern use of all your Azure services in a consistent manner.<\/li>\n<li>Azure Disk Encryption helps protect data on disks that are used with VM and VM Scale sets, and we have now added the ability to use <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-machines%2Flinux%2Fdisk-encryption-overview&amp;data=02%7C01%7CDevrim.Iyigun%40microsoft.com%7C0b2ca926bfc04cbdb4f308d7e7d1a227%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637232759863451563&amp;sdata=kKdrcwo1iiKMItfBRUxsFBojf4uSml%2BNOuLnmmEpTmk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Disk Encryption<\/a> to secure Red Hat Enterprise Linux BYOS Gold Images. The subscription&nbsp;must&nbsp;be <a href=\"https:\/\/access.redhat.com\/solutions\/253273\" target=\"_blank\" rel=\"noopener noreferrer\">registered<\/a> before Azure Disk Encryption can be enabled.<\/li>\n<\/ol>\n<h3>Azure Key Vault innovation<\/h3>\n<p>Azure Key Vault is a unified service for secret management, certificate management, and encryption key management, backed by FIPS-validated hardware security modules (HSMs). Here are some of the new capabilities we are bringing for our customers:<\/p>\n<ol>\n<li><strong>Enhanced security with <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/key-vault\/general\/private-link-service\" target=\"_blank\" rel=\"noopener noreferrer\">Private Link<\/a><\/strong>\u2014This is an optional control that enables customers to access their Azure Key Vault over a private endpoint in their virtual network. Traffic between their virtual network and Azure Key Vault flows over the Microsoft backbone network, thus providing additional assurance.<\/li>\n<li><strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/key-vault\/keys\/hsm-protected-keys\" target=\"_blank\" rel=\"noopener noreferrer\">More choices for BYOK<\/a><\/strong>\u2014Some of our customers generate encryption keys outside Azure and import them into Azure Key Vault, in order to meet their regulatory needs or to centralize where their keys are generated. Now, in addition to nCipher nShield HSMs, they can also use SafeNet Luna HSMs or Fortanix SDKMS to generate their keys. These additions are in preview.<\/li>\n<li><strong>Make it easier to rotate secrets<\/strong>\u2014Earlier we released a public preview of notifications for keys, secrets, and certificates. This allows customers to receive events at each point of the lifecycle of these objects and define custom actions.&nbsp;A common action is rotating secrets on a schedule so that they can limit the impact of credential exposure. You can see the new tutorial <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/key-vault\/secrets\/tutorial-rotation\">here<\/a>.<\/li>\n<\/ol>\n<h3>Platform security innovation<\/h3>\n<p>Platform security for customers\u2019 data recently took a big step forward with the General Availability of <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/confidential-computing\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Confidential Computing<\/a>. Using the latest <a href=\"https:\/\/aka.ms\/IntelBlog\" target=\"_blank\" rel=\"noopener noreferrer\">Intel SGX<\/a> CPU hardware backed by attestation, Azure provides a new class of VMs that protects the confidentiality and integrity of customer data while in memory (or \u201cin-use\u201d), ensuring that cloud administrators and datacenter operators with physical access to the servers cannot access the customer\u2019s data.<\/p>\n<p>Customer Lockbox for Microsoft Azure provides an interface for customers to review and approve or reject customer data access requests. It is used in cases where a Microsoft engineer needs to access customer data during a support request. In addition to expanded coverage of services in <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/customer-lockbox-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Customer Lockbox for Microsoft Azure<\/a>, this feature is now available in preview for our customers in Azure Government cloud.<\/p>\n<p>You can learn more about our Azure security offerings by heading to the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Azure-Security-Center\/bd-p\/AzureSecurityCenter\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Security Center Tech Community<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/19\/microsoft-build-innovations-capabilities-developers-customers-secure\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of this week\u2019s Build virtual event, we\u2019re introducing new Identity innovation to help foster a secure and trustworthy app ecosystem, as well as announcing a number of new capabilities in Azure to help secure customers.<br \/>\nThe post Microsoft Build brings new innovations and capabilities to keep developers and customers secure appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35064,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6426,347,46,1064],"class_list":["post-35063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-security","tag-cybersecurity","tag-encryption","tag-security-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Build brings new innovations and capabilities to keep developers and customers secure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Build brings new innovations and capabilities to keep developers and customers secure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T15:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1038\" \/>\n\t<meta property=\"og:image:height\" content=\"692\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Build brings new innovations and capabilities to keep developers and customers secure\",\"datePublished\":\"2020-05-19T15:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png\",\"keywords\":[\"Azure Security\",\"Cybersecurity\",\"Encryption\",\"Security Intelligence\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/\",\"name\":\"Microsoft Build brings new innovations and capabilities to keep developers and customers secure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png\",\"datePublished\":\"2020-05-19T15:00:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png\",\"width\":1038,\"height\":692},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/azure-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Build brings new innovations and capabilities to keep developers and customers secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Build brings new innovations and capabilities to keep developers and customers secure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Build brings new innovations and capabilities to keep developers and customers secure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-19T15:00:44+00:00","og_image":[{"width":1038,"height":692,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Build brings new innovations and capabilities to keep developers and customers secure","datePublished":"2020-05-19T15:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png","keywords":["Azure Security","Cybersecurity","Encryption","Security Intelligence"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/","name":"Microsoft Build brings new innovations and capabilities to keep developers and customers secure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png","datePublished":"2020-05-19T15:00:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure.png","width":1038,"height":692},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-build-brings-new-innovations-and-capabilities-to-keep-developers-and-customers-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/"},{"@type":"ListItem","position":3,"name":"Microsoft Build brings new innovations and capabilities to keep developers and customers secure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35063"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35063\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35064"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}