Discover internet-exposed assets with Microsoft Defender EASM in AzureIn this article, I will give some context and demonstrate how to kick-start your journey to get a holistic view of your own or others’…Dec 15, 20221Dec 15, 20221
Microsoft Most Valuable Professional: more than a trophy? 🏆The Microsoft MVP Award, is a prestigious award by the leading technology company Microsoft Corporation, signed by CEO — Satya Nadella…Sep 8, 2022Sep 8, 2022
Microsoft CommunityI am honored to have received the request, trust, and support to establish and organize the Microsoft Security User Group with a great team…Apr 22, 20222Apr 22, 20222
Cloud, AI, IoT, VR, and 3D printing — all in one hackathon.Insights into the Arctic Cloud Developer Challenge 2022.Feb 17, 2022Feb 17, 2022
Sustainability on 1.2.3 + technologyI welcome you to a light touch on sustainability and sustainable technology. We will touch upon defining sustainability, the three pillars…Feb 1, 20227Feb 1, 20227
Log4j not so technicalIT-Security experts, administrators and developers have been working around the clock lately due to a critical vulnerability discovered in…Dec 14, 20213Dec 14, 20213
Do not believe your mobile-app source code is a protected assetIt is interesting to see how companies and organizations believe that their mobile application source code is a protected asset. Protected…Feb 20, 20212Feb 20, 20212
Cyber Security — coping with Covid-19s effect on organizations digital transformationZero Trust (ZT), Endpoint protection (EPP), and Cloud Access Security Broker (CASB) are topics this article will touch upon related to…Jan 13, 2021Jan 13, 2021
Cloud-native app developmentIn today’s application development, it is common to encounter terms like microservices, containers, virtual machines (VMs), orchestrations…Nov 11, 20208Nov 11, 20208
DevOps, DevSecOps, and DataOps, it is all about the “Ops” in 2020This article will give you a small introduction to DevOps, DevSecOps, and DataOps.Let’s break the terms down to details:Mar 5, 202016Mar 5, 202016
Data security in Azure Cloud and SQL environmentAutomation and security while developing code and digital products. Azure Resource Manager + Vulnerability Assessment Baseline RulesFeb 20, 20208Feb 20, 20208