Select Page
WDAG3.gif

Windows 10 – All Things About Application Guard

Hi IT Professionals, While working on a Customers ‘requests on Windows Defender Application Guard related to Microsoft Endpoint Manager – Attack Surface Reduction Policies, I could not find an up-to-date and detailed document from internet search. I have ended up ... continue reading
An image of the Arizona datacenter

Expanding cloud services: Microsoft launches its sustainable datacenter region in Arizona

Today we are launching our newest sustainable datacenter region in Arizona, known as “West US 3.” Datacenters are today’s engine for modern business, providing organizations of all sizes the cloud services and tools to innovate, collaborate, and operate securely and ... continue reading
magdysalem_0-1622676141054.png

How-To: Deploy Microservice Application with Secrets Store CSI Driver Using Helm Chart

In the last blog we discussed AKS Pod Identity and how we utilize this feature in our application and establish a secure access to Azure resources using Azure SDK libraries. One of disadvantage of using Pod Identity is in case ... continue reading
Graphic of presentation and verification UX design stages on an iPhone screen.

How user experience is shaping verifiable credentials and identity

Since 2017, Microsoft has been working with the identity community on two groundbreaking technologies designed from the ground up to make digital privacy convenient and practical: decentralized identifiers and verifiable credentials. We believe verifiable credentials will revolutionize the way we ... continue reading
Visual chart depicting the four stages of the life cycle of an incident: Before, during, and after an incident and the lessons learned.

Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats

In part three of this blog series on aligning security with business objectives and risk, we explored what it takes for security leaders to shift from looking at their mission as purely defending against technical attacks, to one that focuses ... continue reading
magdysalem_1-1618267540439.png

How-To: Deploy Microservice Application with Pod Identity Using Helm Chart

In the last blog we discussed how to deploy AKS fully integrated with AAD. Also we discussed deploying add-on for Azure Pod Identity and Azure CSI driver. In the article we will discuss how to create an application that using ... continue reading
magdysalem_0-1617211808512.png

HOW-TO: Deploy AKS with POD Managed Identity and CSI using Terraform and Azure Pipeline

Today as we develop and run application in AKS, we do not want credentials like database connection strings, keys, or secrets and certificates exposed to the outside world where an attacker could take advantage of those secrets for malicious purposes ... continue reading
Picture1.png

Create Your Own Custom Endpoint Administration Console Using Microsoft Power Apps

I've heard a bit of interest expressed recently in the ability to create a customizable Endpoint Configuration Manager (SCCM/ConfigMgr) console that could either be pruned down or featured up in a way to customize it to fit the specific needs ... continue reading
MPI Performance Improvements HBv3 (EPYC 7003-series) versus HBv2 (EPYC 7002-series

More performance and choice with new Azure HBv3 virtual machines for HPC

HPC-optimized virtual machines featuring AMD EPYC 7003-series processors Today Azure advances the velocity at which we bring the latest technologies to our HPC customers and the compute performance we put at their fingertips. We are excited to announce Azure HBv3-series ... continue reading
USB2.jpg

MEM – All Things About USB Drive Management and Troubleshooting

Dear IT Pros, Today, we would discuss all things about USB flash drives management including access protection, Bitlocker encryption, AV security, and troubleshooting. Firstly, we should not reinvent the wheel, so we start with Paul Bergson’s excellent Tech blog article ... continue reading