January 31, 2022

Creating an AKS Release Pipeline in Azure DevOps

AKS and Kubernetes in general is still fairly new to me, but its something I am using more and more every day. One of the challenges […]
January 31, 2022

How to Securely Connect to Your Azure SQL Database?

The topic of #cybersecurity has been hot recently, especially when it comes to databases where data is stored. Continue reading on Level Up Coding »
January 31, 2022

Private AKS and ACR Using Private Endpoint – Part 1/2

Introduction  Many companies use AKS to deploy their containerized workloads. To secure their infrastructure, they make it private. They also make the Azure Container Registry private. […]
January 29, 2022

Enable AKS Flux Extension with Infrastructure as Code

Flux is a solution for doing GitOps on your AKS cluster. You can configure your cluster configuration in Git and have it sync with your cluster […]
January 29, 2022

Gartner® names Microsoft a Leader in the 2022 Magic Quadrant™ for Enterprise Information Archiving

With data doubling every two years, it is more critical than ever to have simple and integrated tools to understand and manage risks to an organization. […]
January 29, 2022

Build a privacy-resilient workplace with Microsoft Priva

Today, we celebrate international Data Privacy Day. This day reminds us of the importance of respecting privacy, safeguarding data, and enabling trust. However, annual reminders are […]
January 28, 2022

Measure the effectiveness of your Microsoft security with AttackIQ

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. To improve an organization’s cybersecurity readiness, you need to test that […]
January 28, 2022

Discover 3 ways to take a holistic approach to data protection

The risk landscape for organizations has changed significantly in the past few years. Traditional ways of identifying and mitigating risks simply don’t work. While traditionally, organizations […]
January 28, 2022

Just in Time access to Azure Virtual Machines

Microsoft Defender for Cloud offers advanced security features, combining functions such as adaptive application controls (application whitelisting), networking hardening (machine learning that learns the traffic passing […]
January 27, 2022

Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

We have recently uncovered a large-scale, multi-phase campaign that adds a novel technique to traditional phishing tactics by joining an attacker-operated device to an organization’s network […]
January 26, 2022

Rotate Azure VM Passwords with PowerShell and Key Vault

Being able to change Azure VM admin password from Azure Portal easily is very convenient. This feature relies on Azure Agent and VM extension, and it […]
January 25, 2022

KQLCeption – use KQL to investigate Microsoft Sentinel

For people that use a lot of cloud workloads you would know it can be hard to track cost. Billing in the cloud can be volatile […]