Select Page
Graph showing timeline of the Necurs takedown and the staging and operation of StrangeU and RandomU

What tracking an attacker email infrastructure tells us about persistent cybercriminal operations

From March to December 2020, we tracked segments of a dynamically generated email infrastructure that attackers used to send more than a million emails per month, distributing at least seven distinct malware families in dozens of campaigns using a variety ... continue reading
Here is the step by step process to configure Confluent Cloud resources from Azure portal. 

Introducing seamless integration between Microsoft Azure and Confluent Cloud

Real-time streaming is a business imperative for digital transformation Customers are undergoing rapid transformations to stay competitive in an increasingly digital world with cloud design patterns and event streaming playing critical roles in their success. They depend on real-time event ... continue reading
Speakers_Blog_sarah_young_jeff_woosley_ned_pyle_matt_mcspirit.png

Periscope up – what's on the horizon for hybrid event

Now we let the cat out of the bag that we’re putting on an event on Feb 2nd, 2021 – it’s time to go a little deeper. How about some information about the AWESOME content we have lined up that ... continue reading
Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!

Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!

Intro If you are considering deploying your own Microsoft SQL Server instances in AWS EC2 you have some decisions to make regarding the resiliency of the solution. Sure, AWS will offer you a 99.99% SLA on your Compute resources if ... continue reading
image001.png

WAC-Active Directory trust not established or broken. …

PROBLEM: I began configuring a Windows Server 2019 Storage Space Direct (S2D) cluster using 3 virtual machines running on a physical Windows 2019 Hyper-V server. I started the installation using Windows Admin Center (v2009 Bld: 1.2.2009.21002) Cluster Creation wizard. I ... continue reading
Azure Hybrid Cloud Architectures

Build hybrid and multicloud architectures with Azure hybrid solution architectures

This past September at Ignite 2020, we made a ton of new hybrid announcements. And not only did new products go into GA and Preview, we showed how customers have been using our hybrid solutions every day in their own ... continue reading

Azure Arc enabled Kubernetes with GitOps

Lior Kamrat shows Scott Hanselman how Azure Arc enabled Kubernetes provides an easy way to apply GitOps configurations on Kubernetes clusters deployed outside of Azure, which enables you to control and govern those clusters and applications using GitHub repositories as ... continue reading
Create a new Docker Container Image using Windows Admin Center

Modernize Windows Server Apps on Microsoft Azure using Containers with Windows Admin Center and AKS!

Today we are looking at how you can modernize Windows Server Apps on Microsoft Azure using Containers with Windows Admin Center and Azure Kubernetes Service (AKS). We will see how we can create a new custom Docker container image using ... continue reading
blog-secure-development.png

How to design secure and convenient access to AKS clusters

API Server is a crucial component of Kubernetes that allows cluster configuration, workload management and a lot more. While this endpoint is incredibly important to secure; developers and engineers typically require regular and convenient access to that API. Striking a ... continue reading

Monitoring AKS with Azure Sentinel

Sarah and Damien discuss Azure Sentinel – Microsoft's cloud SIEM solution – and how you can use this to implement security monitoring for your AKS clusters.Learn More:Monitoring AKS with Azure SentinelTop 10 Best Practices for Azure Security Microsoft Cybersecurity Reference ... continue reading