Select Page

Why wait? SaaS-delivered data management for the pace of change

It's incredible to think how much can change in a year. The past year has seen unprecedented digital transformation, with 90 percent of companies reporting cloud usage higher than planned over the past year, according to the Flexera 2021 State ... continue reading
Research prototype for high-level network deployment

Empowering operators on their cloud migration journey

For operators, many challenges can be involved in their journey to the cloud, some more complex than others. Here, it is important to note that when it comes to operators’ path to cloud migration, there is no such thing as ... continue reading
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
magdysalem_0-1617211808512.png

HOW-TO: Deploy AKS with POD Managed Identity and CSI using Terraform and Azure Pipeline

Today as we develop and run application in AKS, we do not want credentials like database connection strings, keys, or secrets and certificates exposed to the outside world where an attacker could take advantage of those secrets for malicious purposes ... continue reading
The threat matrix to Kubernetes. The matrix consists of the various attacking techniques that target Kubernetes.

Secure containerized environments with updated threat matrix for Kubernetes

Last April, we released the first version of the threat matrix for Kubernetes. It was the first attempt to systematically map the threat landscape of Kubernetes. As we described in the previous post, we chose to adapt the structure of ... continue reading
Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell

Azure Kubernetes Service on Azure Stack HCI Parity with AKS PowerShell

AksHci PowerShell February Release If you were one of many people who gave us feedback on our December release, we have exciting news for you! In our February release, we’ve delivered one of the most requested features, additional networking options! ... continue reading

Troubleshoot AKS cluster issues with AKS Diagnostics and AKS Periscope

Yun Jung Choi shows Scott Hanselman how to use AKS Diagnostics and AKS Periscope to troubleshoot issues on your AKS cluster. Use AKS Diagnostics to identify problems and get actionable recommendations on how to resolve AKS cluster issues. Run AKS ... continue reading

Autoscale applications on Kubernetes with Kubernetes Event-Driven Autoscaling (KEDA)

Do you want to scale your workloads on Kubernetes without having to worry about the details? Do you want to run Azure Functions anywhere and easily scale it yourself? Tom Kerkhove shows Scott Hanselman how Kubernetes Event-Driven Autoscaling (KEDA) makes ... continue reading
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

Customers unify hybrid and multicloud IT operations with Azure Arc

Businesses today are building and running applications across a variety of ecosystems on-premises, in multiple clouds, and on edge. To maintain agility and ensure compliance, it’s critical to an organization’s success to effectively manage servers, applications, and data at scale—regardless ... continue reading