Goodbye 2022 – It’s Been a Wild Ride
It’s been an exciting ride for the year 2022. As we say goodbye and reflect on the year, it’s hard not to notice the amount of change that has happened…
azure, cybersecurity, IT
It’s been an exciting ride for the year 2022. As we say goodbye and reflect on the year, it’s hard not to notice the amount of change that has happened…
As healthcare and technology continue to evolve, so does the need for increased cybersecurity in healthcare. Healthcare organizations are collecting more data than ever before, making them prime targets for…
Adding sleep or a pause to a PowerShell script can be a great way to improve the efficiency of your workflow. By adding pauses, you can give yourself extra time…
The Australian Cyber Security Centre (ACSC) has released its Essential Eight, a list of eight security strategies that organizations can use to protect themselves from cyber-attacks. The Essential Eight are…
General availability: Ephemeral OS disk support for confidential virtual machines Published date: November 02, 2022 Microsoft announced support for creating confidential VMs using Ephemeral OS disks. This enables customers using stateless workloads…