Skip to content
  • Sun. Nov 9th, 2025

Lets learn something new

Cloud, Cybersecurity, DevOps, AI

  • Blogs
  • Contact Me
  • My Linkedin
  • Shop
  • About Me
  • Bookings
  • Privacy Policy
    • Disclaimer
    • Imprint
    • Opt-out preferences
    • Privacy Statement (US)
    • Cookie Policy (EU)
      • Privacy Statement (EU)
    • Privacy Statement (UK)
      • Cookie Policy (UK)
    • Cookie Policy (CA)
      • Privacy Statement (CA)
    • Privacy Statement (AU)
    • Cookie Policy (ZA)
      • Privacy Statement (ZA)
    • Cookie Policy (BR)
      • Privacy Statement (BR)
  • Book
Top Tags
  • Cybersecurity
  • azure
  • IT
  • DevOps
  • Terraform
  • general
  • ProductReview

Latest Post

Microsoft Azure October 2025 Outage Explained The Rising Threat to Azure Blob Storage Mastering Azure Landing Zones Evolving World of Data Privacy and Protection Israel Azure Ban: Cloud Ethics Debate in 2025
Some random code on laptop screen
Azure Security Updates

Common WAF (Web Application Firewall) attacks

October 6, 2022 Arnav Sharma

A web application firewall (WAF) is a piece of hardware or software that sits between your website and visitors, inspecting traffic for malicious requests. A WAF can help protect your…

ย Cloud Adoption Framework?
Azure General

What is Microsoft Cloud Adoption Framework for Azure?

October 1, 2022 Arnav Sharma

What it is about? If your organization is looking to move to the cloud, you may be wondering what the best way to do that is. The Azure Cloud Adoption…

Cyberbullying
General Security

Cyberbullying: What You Need to Know

September 28, 2022 Arnav Sharma

Let’s be honest. The internet was supposed to connect us, not hurt us. But somewhere between likes, shares, and anonymous profiles, we created a breeding ground for a different kind…

Cybersecurity Trends
General Security Updates

Cybersecurity Trends to Watch in 2023

September 26, 2022 Arnav Sharma

The internet has become a staple in everyday life, with people using it for work, communication, and entertainment. However, as the reliance on the internet grows, so does the risk…

ย IT security mistakes you can make
General Security

5 Terrible IT Security Mistakes You Can Make

September 21, 2022 Arnav Sharma

Why do people make terrible IT security mistakes? There are a few main reasons why people make terrible IT security mistakes. The first is that they’re not always well-versed in…

Cybersecurity for Dummies
General Security

Cybersecurity for Dummies: The Basics You Need to Know

September 20, 2022 Arnav Sharma

Cybersecurity is a term that encompasses a wide range of technology, processes, and practices designed to protect sensitive electronic information from unauthorized access. It includes both hardware and software components,…

Auto Clean Azure Resources โ€“ Using Azure Automation
Azure DevOps General

Auto Clean Azure Resources – Using Azure Automation

September 16, 2022 Arnav Sharma

Here’s an easy way to clean up Azure Subscription and delete all resource groups, plus resources to save some credits. Step 1 is to create a resource group named ‘automation’…

Data Securityย 
General Security

Data Security – Your Data Isn’t as Safe as You Think

September 14, 2022 Arnav Sharma

In today’s digital age, data security is a vital concern for individuals and businesses alike. With the rise of cybercrime, it has become increasingly important to protect personal and sensitive…

DNS security
General Security

DNSCrypt vs DNS over TLS: DNS Security

September 14, 2022 Arnav Sharma

What are DNSCrypt and DNS over TLS? The internet is a scary place. Personal data is constantly being collected by corporations, governments, and hackers. One way to protect your data…

Random Code
Azure DevOps General

Import Existing Azure Resources into Terraform: aztfy

September 12, 2022 Arnav Sharma

Terraform, in case you aren’t aware of it !! Terraform is an infrastructure as a code tool that enables you to define your data centre resources using high-level configuration language…

Posts pagination

1 … 64 65 66 … 69
MVP Badge and Logo
Microsoft MCT (Certified Trainer)
HashiCorp Ambassador Badge
Buy me a coffee link

Recent Posts

  • Secure Online Transactions and Business Models in E-commerce and Marketplaces
  • Microsoft Azure October 2025 Outage Explained
  • The Rising Threat to Azure Blob Storage
  • A Guide to VPN Types
  • Mastering Azure Landing Zones

Recent Comments

  1. TD on Byte Conversion Calculator – KB, MB, GB, TB, PB
  2. Apkunduh on PowerShell – Copy or Move Files and Folders
  3. d06 on Byte Conversion Calculator – KB, MB, GB, TB, PB
  4. TD on PowerShell – Copy or Move Files and Folders
  5. D06 on PowerShell – Copy or Move Files and Folders

Archives

Categories

  • Artificial Intelligence
  • AWS
  • Azure
  • Certification
  • Cybersecurity
  • DevOps
  • General
  • HashiCorp
  • IAM
  • Product Review
  • Security
  • Updates
  • Windows

You missed

General

Secure Online Transactions and Business Models in E-commerce and Marketplaces

November 8, 2025 Arnav Sharma
Azure

Microsoft Azure October 2025 Outage Explained

November 3, 2025 Arnav Sharma
Azure

The Rising Threat to Azure Blob Storage

October 31, 2025 Arnav Sharma
Cybersecurity General

A Guide to VPN Types

October 26, 2025 Arnav Sharma

Lets learn something new

Cloud, Cybersecurity, DevOps, AI

Proudly powered by WordPress | Theme: Newsup by Themeansar.

Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}