Skip to content
  • Mon. Mar 16th, 2026

Lets learn something new

Cloud, Cybersecurity, DevOps, AI

  • Blogs
  • Contact Me
  • My Linkedin
  • Shop
  • About Me
  • Bookings
  • Privacy Policy
    • Disclaimer
    • Imprint
    • Opt-out preferences
    • Privacy Statement (US)
    • Cookie Policy (EU)
      • Privacy Statement (EU)
    • Privacy Statement (UK)
      • Cookie Policy (UK)
    • Cookie Policy (CA)
      • Privacy Statement (CA)
    • Privacy Statement (AU)
    • Cookie Policy (ZA)
      • Privacy Statement (ZA)
    • Cookie Policy (BR)
      • Privacy Statement (BR)
  • Book
Top Tags
  • Cybersecurity
  • azure
  • IT
  • DevOps
  • Terraform
  • general
  • AI

Latest Post

Microsoft Defender Updates: January 2026 Azure Security Updates in January 2026 Cost Optimization for Azure AI Services Microsoft Ignite 2025: The Agent Economy Azure’s Top Security Threats and How to Stop Them
Infrastructure as Code
Cybersecurity

Why “We Encrypt at Rest” Is No Longer Enough

March 13, 2026 Arnav Sharma

There’s a line I keep hearing in security reviews: “We encrypt the database. We’re covered.” A few years ago, that answer was acceptable. Today it’s a liability. The threat landscape…

eMMC vs. SSD storage.
Cybersecurity

Hypervisors Infrastructure Attacks

March 5, 2026 Arnav Sharma

Hypervisor-targeted ransomware just surged 700% in under a year. That’s not a typo. According to Huntress SOC data from late 2025, hypervisor-focused malicious encryption went from accounting for roughly 3%…

GDPR data security
Cybersecurity

PCI DSS v4: What Actually Changed

February 25, 2026 Arnav Sharma

The standard PCI Standard dropped back in March 2022, went through a minor housekeeping revision in June 2024, and as of 31 March 2025, every single requirement is now fully…

Mitre Attack Framework 
Artificial Intelligence Cybersecurity

Malware Evolution: Adaptive code mutating in real-time.

February 19, 2026 Arnav Sharma

For last three decades, cybersecurity has followed a familiar path. Attackers build something nasty, defenders figure out how to catch it, attackers tweak their approach, and the cycle continues. It…

AWS vs Azure vs Google Cloud Certifications
Azure

Microsoft Defender Updates: January 2026

February 9, 2026 Arnav Sharma

If you’re running any part of the Microsoft Defender stack, the past month brought some genuinely useful improvements worth knowing about. I’ve been tracking these changes and wanted to break…

octopus deploy vs azure devops
Azure Updates

Azure Security Updates in January 2026

February 2, 2026 Arnav Sharma

The past month has been relatively quiet on the Azure security front compared to the flurry of activity we saw in the Defender XDR and Endpoint spaces. But “quiet” doesn’t…

Cyber Security?
Cybersecurity Updates

Cybersecurity Landscape in Early 2026

January 27, 2026 Arnav Sharma

The first month of 2026 has been anything but quiet in the cybersecurity world. If you’ve been heads-down on projects and haven’t had time to catch up on the threat…

Azure AI
AI Artificial Intelligence

Prompt Engineering in 2026

January 24, 2026 Arnav Sharma

There’s a joke in tech circles that prompt engineering is just “talking to computers nicely.” And honestly? That’s not entirely wrong. But reducing it to that misses what’s actually happening…

octopus deploy vs azure devops
Cybersecurity

What Is Satellite Cybersecurity Act

January 19, 2026 Arnav Sharma

When most people think about cybersecurity threats, they picture hackers targeting banks, hospitals, or power grids. But there’s a massive attack surface floating above our heads right now that doesn’t…

Mitre Attack Framework 
Cybersecurity Updates

Vulnerabilities That Will Define 2026

January 3, 2026 Arnav Sharma

Every year, I ask myself the same question: what’s actually going to hit us next year? Not theoretical risks, but real exploitable weaknesses that will impact organizations across every sector.…

Posts pagination

1 2 … 72
MVP Badge and Logo
Microsoft MCT (Certified Trainer)
HashiCorp Ambassador Badge
Buy me a coffee link

Recent Posts

  • Why “We Encrypt at Rest” Is No Longer Enough
  • Hypervisors Infrastructure Attacks
  • PCI DSS v4: What Actually Changed
  • Malware Evolution: Adaptive code mutating in real-time.
  • Microsoft Defender Updates: January 2026

Recent Comments

  1. big on PowerShell – Copy or Move Files and Folders
  2. Geometry on Byte Conversion Calculator – KB, MB, GB, TB, PB
  3. A login on DISM Command to Repair Windows Image
  4. svi on Byte Conversion Calculator – KB, MB, GB, TB, PB
  5. Arnav Sharma on Maximizing Business Effectiveness with Azure Landing Zones

Archives

Categories

  • AI
  • Artificial Intelligence
  • AWS
  • Azure
  • Certification
  • Cybersecurity
  • DevOps
  • General
  • HashiCorp
  • IAM
  • Product Review
  • Security
  • Updates
  • Windows

You missed

Cybersecurity

Why “We Encrypt at Rest” Is No Longer Enough

March 13, 2026 Arnav Sharma
Cybersecurity

Hypervisors Infrastructure Attacks

March 5, 2026 Arnav Sharma
Cybersecurity

PCI DSS v4: What Actually Changed

February 25, 2026 Arnav Sharma
Artificial Intelligence Cybersecurity

Malware Evolution: Adaptive code mutating in real-time.

February 19, 2026 Arnav Sharma

Lets learn something new

Cloud, Cybersecurity, DevOps, AI

Proudly powered by WordPress | Theme: Newsup by Themeansar.

Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}