Powered by Microsoft Azure

Month: October 2022

azure, cybersecurity, IT

IaC Modules – Pros & Cons

IaC Modules can help you deploy your infrastructure much faster than other methods, such as manually configuring each component or using a configuration management tool like Ansible, Puppet, or Chef. This is because IaC Modules automate most of the work required to provision and configure your infrastructure. In addition, IaC Modules can help you achieve…
Read more

Cloud Native Security: What Does It Really Mean?

As enterprises move more of their workloads to the cloud, they must also adapt their security strategies to account for this shift. But what does “cloud-native security” really mean? In this article, we explore the concept of cloud-native security and discuss its key features. We also offer some tips on how enterprises can make the…
Read more

How to download Microsoft Certificates

The way certificates could be downloaded in past has been changed. And I had to struggle a bit to find out the correct way of doing it. In someone is interested, here’s the way to do it. Enjoy 😀 Go to https://learn.microsoft.com/en-us/users and sign in. Go to the Certifications Option on the left: Under certificate,…
Read more

Global Cybersecurity Spending to exceed $1 Trillion by 2024

As the world continues to digitize at an increasingly rapid pace, the importance of cybersecurity has never been greater. And according to a new report from Cybersecurity Ventures, global spending on cybersecurity is only going to continue to grow, reaching $1 trillion by 2024. This spending increase is driven by a number of factors, including…
Read more

Generate Terraform & Bicep Code Automatically

Nubesgen is an excellent open-source tool that can be used to generate Infrastructure-as-code configuration files with Terraform or Bicep for Azure web app-related projects. PS – The support for code generation is limited to some resources. You can’t generate the code for everything atm. Refer : NubesGen – going to production on Azure is only…
Read more

Hacking MFA: Why Multi-Factor Authentication May Not Be Enough

What is MFA? Multi-factor authentication (MFA) is an authentication method that requires the use of more than one factor to verify the identity of a user. The most common factors are something you know (like a password), something you have (like a security token), and something you are (like your fingerprint). MFA is often used…
Read more

What’s New in Azure: A Summary of the Last 30 Days (September 2022)

Generally available: Azure Dedicated Host support for Ultra Disk Storage​ Ultra-disks are highly performant disks on Azure that offer high throughput (maximum of 4000 MBps per disk) and high IOPS (maximum of 160,00 IOPS per disk) depending on the disk size. If you are running IaaS workloads that are data intensive and latency sensitive, such as Oracle DB, MySQL DB, other…
Read more

Explaining Cloud Computing to Kids?

Cloud computing can be a confusing concept for adults, let alone kids. But with the ever-growing reliance on technology in our daily lives, children need to understand what cloud computing is and how it works. This article will provide a simple explanation of cloud computing for kids. What is the cloud? The cloud is simply…
Read more

Public preview: Azure Firewall Basic

Azure Firewall Basic provides cost-effective, enterprise-grade network security for small and medium businesses (SMBs). ​Read More Azure Firewall Basic provides cost-effective, enterprise-grade network security for small and medium businesses (SMBs). 

The most common WAF attack types

A web application firewall (WAF) is a piece of hardware or software that sits between your website and visitors, inspecting traffic for malicious requests. A WAF can help protect your site from common attack types like cross-site scripting (XSS) and SQL injection by identifying and blocking these requests. In this article, we’ll take a look…
Read more