Skip to content
  • Wed. Apr 15th, 2026

Lets learn something new

Cloud, Cybersecurity, DevOps, AI

  • Blogs
  • Contact Me
  • My Linkedin
  • Shop
  • About Me
  • Bookings
  • Privacy Policy
    • Disclaimer
    • Imprint
    • Opt-out preferences
    • Privacy Statement (US)
    • Cookie Policy (EU)
      • Privacy Statement (EU)
    • Privacy Statement (UK)
      • Cookie Policy (UK)
    • Cookie Policy (CA)
      • Privacy Statement (CA)
    • Privacy Statement (AU)
    • Cookie Policy (ZA)
      • Privacy Statement (ZA)
    • Cookie Policy (BR)
      • Privacy Statement (BR)
  • Book
Top Tags
  • Cybersecurity
  • azure
  • IT
  • DevOps
  • Terraform
  • general
  • AI

Latest Post

When Not to Use IaaS What’s Microsoft 365 E7 The Takedown of Tycoon 2FA Microsoft Defender Updates: January 2026 Azure Security Updates in January 2026
Avoiding Darkweb Scams
Azure

Avoiding Darkweb Scams

May 8, 2023 Arnav Sharma

Ever wondered what lurks in the shadowy corners of the internet that Google can’t find? Let’s talk about the dark web – a topic that’s often sensationalized but rarely explained…

Kubernetes for beginners 
Cybersecurity General Security

Certificate IV in Cyber Security – My Thoughts

May 8, 2023 Arnav Sharma

As technology advances, so does the need for cybersecurity. Every organization, whether big or small, must ensure its network security and infrastructure are up to the mark. This is where…

Australian Government’s Ransomware Action Plan 2021
General Security

Australian Government’s Ransomware Action Plan 2021

May 5, 2023 Arnav Sharma

In recent years, the rise of ransomware attacks has become a significant concern for governments, businesses, and individuals alike. These attacks can lead to devastating consequences, such as data loss,…

Threat intelligence and Computing
General Security Updates

Quantum Computing: Usage and Future Implications

May 4, 2023 Arnav Sharma

Think your laptop is fast? Wait until you get a load of quantum computing. While your current machine processes information bit by bit like reading a book one word at…

NordPass Password
General Security

NordPass Password Manager Review 2023

May 2, 2023 Arnav Sharma

NordPass Review In today’s digital world, online security is of utmost importance for everyone. With the growing number of online accounts, managing passwords can become overwhelming, leading to security risks.…

SQL Repair Using Stellar Repair for MS SQL
General

SQL Repair Using Stellar Repair for MS SQL

May 2, 2023 Arnav Sharma

If you’re a business owner running a Microsoft SQL Server database, then you know how vital your data is to your operation. Unfortunately, database corruption is not uncommon and can…

SQL Repair 
Product Review

Stellar Data Recovery to Recover Lost Data

May 2, 2023 Arnav Sharma

Losing important data is a nightmare we never want to face. Unfortunately, data loss can happen due to a variety of reasons like accidentally deleting files, hard drive crashes, virus…

The SSL Store Review
General

The SSL Store Review

May 1, 2023 Arnav Sharma

If you are looking for reliable and efficient SSL certificates provider, look no further than The SSL Store. The SSL Store is renowned in the cybersecurity industry for providing SSL…

Cybersecurity healthcare
Cybersecurity General Security

Microsoft Cloud for Healthcare: Future of Healthcare

May 1, 2023 Arnav Sharma

Walk into any hospital today and you’ll see doctors pulling up patient records on tablets, nurses coordinating care through secure messaging apps, and specialists consulting with colleagues across the globe…

Hashing vs Encryption
General Security

Hashing and Encryption: How are they different?

April 28, 2023 Arnav Sharma

You’ve probably heard both terms thrown around in conversations about cybersecurity. Maybe someone mentioned “hashing passwords” in a meeting, or you read about “encrypted messages” in the news. And if…

Posts pagination

1 … 61 62 63 … 72
MVP Badge and Logo
Microsoft MCT (Certified Trainer)
HashiCorp Ambassador Badge
Buy me a coffee link

Recent Posts

  • When Not to Use IaaS
  • Why You Cannot Prevent Prompt Injection
  • What’s Microsoft 365 E7
  • The Takedown of Tycoon 2FA
  • Why “We Encrypt at Rest” Is No Longer Enough

Recent Comments

  1. big on PowerShell – Copy or Move Files and Folders
  2. Geometry on Byte Conversion Calculator – KB, MB, GB, TB, PB
  3. A login on DISM Command to Repair Windows Image
  4. svi on Byte Conversion Calculator – KB, MB, GB, TB, PB
  5. Arnav Sharma on Maximizing Business Effectiveness with Azure Landing Zones

Archives

Categories

  • AI
  • Artificial Intelligence
  • AWS
  • Azure
  • Certification
  • Cybersecurity
  • DevOps
  • General
  • HashiCorp
  • IAM
  • Product Review
  • Security
  • Updates
  • Windows

You missed

AWS Azure

When Not to Use IaaS

April 12, 2026 Arnav Sharma
AI Artificial Intelligence Cybersecurity

Why You Cannot Prevent Prompt Injection

April 2, 2026 Arnav Sharma
AI Azure Security Updates

What’s Microsoft 365 E7

March 26, 2026 Arnav Sharma
Azure Cybersecurity

The Takedown of Tycoon 2FA

March 22, 2026 Arnav Sharma

Lets learn something new

Cloud, Cybersecurity, DevOps, AI

Proudly powered by WordPress | Theme: Newsup by Themeansar.

Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}