Search
Close this search box.

Azure Kubernetes security common misconceptions

Azure Kubernetes Service (AKS) has emerged as a leading platform for container orchestration, offering scalability (with Keda), flexibility, and an easy management panel. However, like any technology, misconceptions about security can lead to suboptimal practices and positionally compromise the integrity of your applications.  In this blog post, we’ll discuss some common misconceptions about Azure Kubernetes … Lees meer

Security and Azure DevOps – part 2

In this new post about security in DevOps or Azure DevOps we will take some key elements that can be important in the SDLC of your organization. A better title could: Enhancing Application Security: A Guide to OWASP ASVS in Development Lifecycles Introduction In an era where digital transformation is rapidly reshaping industries, the importance … Lees meer

Exploring SELinux security Policies (Intro)

In the ever-evolving landscape of cybersecurity, safeguarding sensitive data and ensuring the integrity of systems has become the highest priority. One powerful tool in the arsenal of Linux security is SELinux (Security-Enhanced Linux), a mandatory access control mechanism that provides an additional layer of protection beyond the traditional discretionary access control (DAC) mechanisms. Understanding SELinux … Lees meer

Cost-efficient VPN in Azure

If you need to support a small or mediaum-sized organisation in Azure, cost is essential.Microsoft Azure offers a range of Virtual private network (VPN) solutions to securely connect on-premise or remote devices to Azure resources. In this blog, we’ll discuss cost-efficient VPN solutions that fits best with your organisation. Types of VPN Solutions Our choice … Lees meer

Azure Diagnostic settings multi region support

Everyone has heard of “Mission Critical” in Azure, Which describes that an application needs to be deployed in one or more regions within Azure to have 100% redundancy. For example, an application is deployed in West and North Europe. It brings us to the next problem, what if diagnostic settings have another Log Analytics Workspace … Lees meer

Failed to start the Application Gateway

When setting up an Application Gateway (AGW), the public and private IP addresses of the Application Gateway are required in order to complete the configuration. The Application Gateway needs 24 hours before new DNS and network settings are taken into account. Or you can trigger this part of the process by manually stopping and starting … Lees meer