Select Page

4 breakthrough ideas for compliance and data security

Compliance management will never be easy, but there are ways to make it simpler and more transparent. Every year, organizations confront a growing volume and diversity of data and ever-evolving industry and government regulations. But the answer to more data, ... continue reading
Offset for monthly maintenance window reoccurrence schedule in Configuration Manager TP 2205

Offset for monthly maintenance window reoccurrence schedule in Configuration Manager TP 2205

Offset for reoccurring monthly maintenance window reoccurrence schedule. Based upon your feedback, you can now offset monthly maintenance window schedules to better align deployments with the release of monthly security updates. For example, using an offset of two days after ... continue reading

Performance of Azure Shared Disk with Zone Redundant Storage (ZRS)

On September 9th, 2021, Microsoft announced the general availability of Zone-Redundant Storage (ZRS) for Azure Disk Storage, including Azure Shared Disk. What makes this interesting is that you can now build shared storage based failover cluster instances that span Availability ... continue reading
Screen grab of the Tarrask malware creating new registry keys and new scheduled tasks in Registry Editor.

Tarrask malware uses scheduled tasks for defense evasion

As Microsoft continues to track the high-priority state-sponsored threat actor HAFNIUM, new activity has been uncovered that leverages unpatched zero-day vulnerabilities as initial vectors. The Microsoft Detection and Response Team (DART) in collaboration with the Microsoft Threat Intelligence Center (MSTIC) ... continue reading
edzonca_0-1648787161771.png

A Starting Point for Monitoring Azure

Hi All, Well, usually we concentrate on the monitoring of Azure Resources, as component, for example, how I can monitor my VM or my Apps, but Is also important, check the Azure Infrastructure. Not our resources in Azure, but the ... continue reading
Illustration of the Custom IP Prefix onboarding process.

Bring your own IP addresses (BYOIP) to Azure with Custom IP Prefix

When planning a potential migration of on-premises infrastructure to Azure, you may want to retain your existing public IP addresses due to your customers' dependencies (for example, firewalls or other IP hardcoding) or to preserve an established IP reputation. Today, ... continue reading
Confidential Virtual Machine in Azure Portal.

Meet PCI compliance with credit card tokenization

In building and running a business, the safety and security of your and your customers' sensitive information and data is a top priority, especially when storing financial information and processing payments are concerned. The Payment Card Industry Data Security Standard ... continue reading
Bicep vs ARM Templates

Infrastructure as Code (IaC): Comparing the Tools

When you go to deploy a server or any part of our infrastructure manually, how long does it take you? Can you do a manual deployment end to end without any mistakes? Now, how do you scale that? This is ... continue reading
Azure VMware Solution (AVS) for VMware Admins Primer

Azure VMware Solution (AVS) for VMware Admins Primer

It’s funny to think there was such a pushback on virtualization when it first came out versus being the norm for most of us now. As a VMware admin myself, I remember all the discussions with application teams trying to ... continue reading
Identities and endpoints as their authentication and compliance requests are intercepted by the Zero Trust Policy for verification before being granted access to networks and the data, apps, and infrastructure they’re composed of.

4 best practices to implement a comprehensive Zero Trust security approach

Today’s threat actors don’t see barriers, they see opportunities. As the old firewalls protecting the corporate network become obsolete amid the rush to adopt a hybrid workspace, implementing Zero Trust security has become an imperative across all sectors, both public ... continue reading