Malicious attacks on your cloud workload can take many different forms; according to the Microsoft Digital Defence Report, there have been a more than 40% increase in the Remote Desktop Protocol (RDP) and Secure Shell (SSH) attacks in the last 12 months.
This is Part Two of configuring Site-to-Site IPSec connectivity between on-premises NSX-t and Azure. Here we are going to focus on the Azure side and learn what it takes to set up the connection between the two.
Many organizations have already realized that the public cloud only, or private cloud only, strategy is not always a good strategy. To benefit from the two worlds, a hybrid cloud strategy is the better option for many organizations.
When migrating or provisioning a new workload on your Azure cloud, you must be aware that your new cloud workload has different playing roles. Central security management, authentication and security hardening must be your priority.
As more and more businesses adopt the “working from anywhere” policy, these policies also open other challenges that the business must deal with. These challenges must be met with a balanced response covering complexity, security and costs.
To secure your data, you are probably using data encryption and data encryption keys on each set of your data. This method of data encryption can be simplified by using centralised encryption keys offered by Azure Key Vault. Let’s learn how to set it up, and how long it takes.Continue reading
Sometimes you are required to deliver services that combine the different workloads of two different kernels. Does this strategy of service delivery require two different Kubernetes clusters? Can you run the different workloads on the same Kubernetes cluster?
DevOps culture is becoming the norm of the cloud era. Many companies are beginning to think of implementing this culture into their businesses. As an IT professional, is important that you be familiar with these new skills, and be prepared to use them in the future. How do we start?
Many organisations are diverting their focus to protecting their data against Ransomware attacks. Even the best security out there cannot make you 100% immune. So how can you use Azure Private Endpoint to reduce your surface area facing an attack against your data?
Microsoft File Share is a fully managed service hosted on the Microsoft Azure cloud. It can be shared and accessed by using NFS and SMB protocols. How does it work, and how can you deploy this service?