What is Cloud Security?

Welcome to the world of Cloud Security! Or better Hybrid-Cloud Security. If you’ve ever wondered how your data stays safe as it floats around in the cloud, you’re at the right place. Memorize this: you’re standing in front of a massive, invisible vault that holds everything from your vacation photos to your company’s most sensitive … Lees meer

Data Sensitivity and ChatGPT a good combo?

In the modern business landscape, leveraging new technologies like ChatGPT can enhance productivity and decision-making processes. However, with the integration of such AI-driven tools, it is crucial to understand and manage data and more specific the sensitivity of data to safeguard your organization’s critical information. This blog explores what Open AI (ChatGPT) is, how to … Lees meer

Schedule AKS clusters to run during Business Hours

Introduction In the dynamic landscape of cloud computing, optimizing costs is a crucial aspect of managing resources efficiently.Microsoft Azure Kubernetes Services (AKS) is a powerful platform for deploying, managing, and scaling containerized applications.While AKS provides flexibility and scalability, it’s equally important for organizations to adopt cost-saving measures.One effective strategy is shutting down and starting AKS … Lees meer

Strategy for scaling a web app to handle high-traffic on Azure

Scaling a web app to handle high traffic on Microsoft Azure involves both vertical and horizontal scaling strategies. Azure provides various services and tools to help you scale your web app efficiently.Here’s a comprehensive scaling strategy: 1. App Service Plan STart with an appropriate App Service Plan. Azure’s App Service Plans allow you to scale … Lees meer

Security and Azure DevOps – part 2

In this new post about security in DevOps or Azure DevOps we will take some key elements that can be important in the SDLC of your organization. A better title could: Enhancing Application Security: A Guide to OWASP ASVS in Development Lifecycles Introduction In an era where digital transformation is rapidly reshaping industries, the importance … Lees meer

Security and Azure Devops – part 1

How to configure a project and repository to support secure pipelines? It can be done in Azure DevOps in an easy way, so read along and configure with me some security best practices for your DevOps environment. Prerequisites You must create an Azure DevOps Organization and one project for some exercises, for more info see: … Lees meer

Exploring SELinux security Policies (Intro)

In the ever-evolving landscape of cybersecurity, safeguarding sensitive data and ensuring the integrity of systems has become the highest priority. One powerful tool in the arsenal of Linux security is SELinux (Security-Enhanced Linux), a mandatory access control mechanism that provides an additional layer of protection beyond the traditional discretionary access control (DAC) mechanisms. Understanding SELinux … Lees meer

App Service Docker continuous deployment

Before Microsoft announced Container Apps (Kubernetes as a Service), App services were considered an alternative if companies did not want to set up and maintain an entire Kubernetes stack. Here, a developer can push docker images to an Azure Container Registry, where the App Service pull and run the image. High level design – Architecture … Lees meer