Data Loss Prevention – Human error, insider threats and the in-between
Do you remember the first or last time you found a user had shared sensitive information with the wrong people?
Read moreDo you remember the first or last time you found a user had shared sensitive information with the wrong people?
Read moreRecently a new flaw was discovered in PolKit – a component which controls system-wide privileges in Unix OS. This vulnerability
Read moreA lot has changed recently in the Azure Log Analytics UX. This post covers some of the latest updates, to
Read moreAKS pod identity gives pods running in Kubernetes their own first-class identity in Azure Active Directory so they can securely
Read moreCluster auto-upgrade ensures that nodes in a cluster are running the latest version of Kubernetes. Source: Azure Roadmap
Read moreDomains hosted on any Microsoft DNS service, including Azure DNS and Traffic Manager, will continue to work after DNS Flag
Read moreNode auto-repair monitors nodes in a cluster and initiates a repair process if a node fails to meet health criteria.
Read moreLimit access to the Kubernetes API server to your Azure virtual network. Source: Azure Roadmap
Read moreAchieve higher reliability and resiliency by using Availability Zones (AZ). Source: Azure Roadmap
Read moreMultiple node pools enable you to have different VM size per node pool to accommodate custom resource needs Source: Azure
Read more