Mike! Mike! Mike!
What day is it?
Its Security Day with Mike!

Cyber threats are evolving, and staying ahead requires the right tools, strategies, and knowledge.
-
A New Year Reset for Security Leaders: From Announcements to Architecture
As security enters a new year, leaders face a shift that goes beyond tools and announcements. This post explores what recent industry direction reveals about identity, architecture, and…
4 min read
-
Reflecting on the Journey Since 2025 with Security Day with Mike: Thank you!
As we close another chapter and look back to when It’s Security Day with Mike! first launched in 2025, I want to take a moment to say Thank…
4 min read
-
Microsoft Ignite 2025 Security Announcements: What Technical Leaders Need to Know
Microsoft Ignite 2025 introduced a major shift in enterprise security, focusing on AI governance, identity centric protection, and autonomous security operations. This post breaks down the most important…
4 min read
-
Simple Syslog Ingestion with Microsoft Sentinel Data Lake
Learn how to easily connect your Syslog collector VM, configure a Data Collection Rule, and validate real-time log ingestion into Microsoft Sentinel Data Lake. This step-by-step guide helps…
4 min read
-
How To Confidently Create Microsoft Sentinel data lake Custom Tables for Security Analytics
Learn how to confidently create custom tables in Microsoft Sentinel Data Lake using the Azure CLI. This step-by-step guide walks you through setup, schema verification, and switching your…
4 min read
-
The Proven Way Sentinel Data Lake Slashes Cost
Introduction Security teams have long faced a tough challenge: balancing visibility with cost. A year ago, many organizations hesitated to adopt Microsoft Sentinel because of the high cost…
4 min read





