The latest online on-demand course that I’ve been working on is now out the door. SQL Server Locking, Blocking, and Deadlocks for Developers and DBAs is […]
Kubernetes Helm, often referred to as the Kubernetes package manager, is a tool that streamlines the process of installing and managing applications on Kubernetes. You Continue […]
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme […]
User and Entity Behavior Analytics (UEBA) is a type of security solution that leverages advanced analytics technology such as machine learning and deep learning, to Continue […]
Summary In recent months, Microsoft Threat Intelligence has observed threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller […]
The previous article explained how user could configure and limit the access to Cloud Service Extended Support (CSES) only from specific Virtual Network(s) by using internal […]
Let’s not talk about AI, but instead let’s talk about Azure SQL backup and recovery. What aspects to consider for disaster recovery? What options are available […]