Select Page
Graph showing ContosoCars locations, device ownership, groups, platforms, and requirements. All part of their use-case management plan.

Step 5. Set up mobile device management: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment ... continue reading
HashiCorp Vault on Azure

HashiCorp Vault on Azure

Working with Microsoft, HashiCorp launched Vault with a number of features to make secret management easier to automate in Azure cloud. Yoko Hyakuna from HashiCorp joins Donovan Brown to show how Azure Key Vault can auto-unseal the HashiCorp Vault server, ... continue reading
Using HashiCorp Vault with Azure Kubernetes Service (AKS)

Using HashiCorp Vault with Azure Kubernetes Service (AKS)

As the adoption of Kubernetes grows, secret management tools must integrate well with Kubernetes so that the sensitive data can be protected in the containerized world. On this episode, Yoko Hakuna demonstrates the HashiCorp Vault's Kubernetes auth method for identifying ... continue reading

Solving the TLS 1.0 problem

The use of Transport Layer Security (TLS) encryption for data in transit is a common way to help ensure the confidentiality and integrity of data transmitted between devices, such as a web server and a computer. However, in recent years ... continue reading
Windows Server 101: Hardening IIS via Security Control Configuration

Windows Server 101: Hardening IIS via Security Control Configuration

IIS, the web server that’s available as a role in Windows Server, is also one of the most used web server platforms on the internet. Hardening IIS involves applying a certain configuration steps above and beyond the default settings. The ... continue reading
image

Processing trillions of events per day with Apache Kafka on Azure

This blog is co-authored by Noor Abani and Negin Raoof, Software Engineer, who jointly performed the benchmark, optimization and performance tuning experiments under the supervision of Nitin Kumar, Siphon team, AI Platform. Our sincere thanks to Dhruv Goel and Uma ... continue reading
Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Introduction Hello, my name is Richard McIver and I’m a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager. I was recently working with a customer who suddenly started receiving a strange KDC error when attempting to run ... continue reading
XentIT Cloud Security Stack for Azure flowchart

Security for healthcare through vigilant agents and virtual patching

Healthcare organizations depend on data-driven decisions. To enable better decisions and better health outcomes, healthcare organizations are moving to the cloud. There, the latest advances in artificial intelligence, machine learning, and analytics can be more easily tested and implemented. For ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Hello everyone, I’m Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I’d like to share some insights for securing PowerShell credentials using certificates. This post is based on a recent customer project, but we’ll also wrap ... continue reading
Loading...