Select Page
The threat matrix to Kubernetes. The matrix consists of the various attacking techniques that target Kubernetes.

Secure containerized environments with updated threat matrix for Kubernetes

Last April, we released the first version of the threat matrix for Kubernetes. It was the first attempt to systematically map the threat landscape of Kubernetes. As we described in the previous post, we chose to adapt the structure of ... continue reading

Limited-time free quantities offer for Azure Synapse Analytics

Customers with qualifying subscription types* can now try the new serverless SQL pool and Apache Spark pool resources in Azure Synapse Analytics using free quantities until July 31, 2021. Sign-in to your Azure Synapse Analytics account to get started. Serverless ... continue reading
Diagram for delivering a continuum of compute from cloud to edge

Do more for the National Security mission with Azure

As we continue to deliver on our commitment to providing the broadest range of commercial innovation for government, we’re rapidly advancing new capabilities for the National Security mission. Azure helps mission teams gain insight from data—at any security level—anywhere. For ... continue reading

Accelerating Department of Defense mission workloads with Azure

As the Azure engineering team continues to deliver a rapid pace of innovation for defense customers, we’re also continuing to support Department of Defense (DoD) customers and partners in delivering new capabilities to serve mission needs. In many cases, accelerating ... continue reading

What’s new with SQL Server Big Data Clusters

SQL Server Big Data Clusters (BDC) is a new capability brought to market as part of the SQL Server 2019 release. BDC extends SQL Server's analytical capabilities beyond in-database processing of transactional and analytical workloads by uniting the SQL engine ... continue reading
Web shell attacks continue to rise

Web shell attacks continue to rise

One year ago, we reported the steady increase in the use of web shells in attacks worldwide. The latest Microsoft 365 Defender data shows that this trend not only continued, it accelerated: every month from August 2020 to January 2021, ... continue reading
sifriger_0-1608569858351.png

Deep Dive How To Debug Syslog Ingestion for Sentinel and Log Analytics

Hello everybody, Simone here to tell you about a situation that happened many times to my customers: understanding how the syslog ingestion works. To make subject clear make sure you have clear in mind the below references: RFC5424 - https://tools.ietf.org/html/rfc5424#section-6.2.1 ... continue reading
Here is the step by step process to configure Confluent Cloud resources from Azure portal. 

Introducing seamless integration between Microsoft Azure and Confluent Cloud

Real-time streaming is a business imperative for digital transformation Customers are undergoing rapid transformations to stay competitive in an increasingly digital world with cloud design patterns and event streaming playing critical roles in their success. They depend on real-time event ... continue reading
Azure Synapse Studio displaying the Knowledge center.

Quickly get started with samples in Azure Synapse Analytics

Get started immediately on your first project with the new Knowledge center in the Azure Synapse Studio. To further accelerate time to insight in Microsoft Azure Synapse Analytics, we are introducing the Knowledge center to simplify access to pre-loaded sample ... continue reading
HoussemDellai_0-1600795886662.png

How To Scale Apps On Kubernetes

  Introduction Application scalability is very important for business success. Companies spend millions in ideation, software development, testing, and deployment to provide value to their customers. These customers then will use the app, but not in a regular basis. We ... continue reading