https://www.facebook.com/troubleshootingazure

Month: August 2022

azure, cybersecurity, IT

IT in the last 10 years: What has changed?

A brief history of IT Information technology (IT) is a term that encompasses all forms of technology used to create, store, exchange, and use information in its various forms. Including computer hardware, software, networking, and the Internet. IT is considered a subset of information and communications technology (ICT). The history of IT is fascinating –…
Read more

The Power of Getting Out of Your Comfort Zone

The Importance of Getting Out of Your Comfort Zone Every day, we face new challenges and opportunities. Some of us shy away from these opportunities because they force us to step out of our comfort zone. But what we don’t realize is that by staying in our comfort zone, we’re only depriving ourselves of the…
Read more

Why People Quit Jobs: The Top 10 Reasons

In today’s job market, it is not uncommon for people to switch jobs frequently. However, there are still many people who stay with the same organization for years. So, why do people leave their jobs? The reasons can vary, but there are some common themes. Perhaps the person is not challenged in their current role,…
Read more

Vulnerability Management- Past, Present, and Future

Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities. It is a continuous process that should be embedded into an organization’s overall security program. Security teams need to have a clear understanding of what a vulnerability is and how it can impact their organization. A vulnerability is a flaw or weakness in…
Read more

The Internet of Things, VR and the Metaverse

Defining the Internet of Things, VR and the Metaverse We are in the midst of a technological revolution. The way we interact with the world is changing, and it’s happening faster than ever before. The Internet of Things (IoT), virtual reality (VR) and the metaverse are three technologies that are redefining our reality. The Internet…
Read more

The 5 biggest cyber attacks of the past decade

A cyber attack is any type of offensive action that targets computer networks or devices. Cyber attacks can be carried out by individuals, groups, or governments, and their motives can range from getting revenge to political or ideological gain. Some of the most common types of cyber attacks are denial-of-service attacks, malware infections, and phishing…
Read more

Azure Update Management Center (Preview)

Update management centre (preview) is a unified service to help manage and govern updates for all your machines. You can monitor Windows and Linux update compliance across your deployments in Azure, on-premises, and on the other cloud platforms from a single dashboard. Using the Update management centre (preview), you can make updates in real-time or…
Read more

Deploy ARM template using Terraform

Terraform is a tool that can be used to manage the infrastructure of a company. Terraform can be used to create, manage, and update infrastructure as code. ARM templates are files that are used to describe the infrastructure that needs to be created. In this article, I will show you how to deploy an ARM…
Read more

Azure Application Security Group vs Network Security Group (ASG vs NSG)

Azure application security groups and Azure network security groups are both powerful tools used to protect your applications and resources in Azure. Both the vital for Azure Security and easy to configure. However, there are some critical differences between NSG and ASG that you should be aware of before deciding which one is right for…
Read more

Regulatory compliance using Defender for Cloud

The regulatory compliance dashboard in Microsoft Defender for Cloud shows your selected compliance standards with all their requirements, where supported requirements are mapped to applicable security assessments. The status of these assessments reflects your compliance with the standard. Add a standard to your Azure resources To add standards to your dashboard: 2. Select the Subscrition:…
Read more