SUMMARY: This guide demonstrates how to use Terraform, an Infrastructure as Code (IaC) tool from HashiCorp, to define, provision, and manage resources like virtual machines on the Microsoft Azure cloud. By following the steps to write configuration files and apply them, you can automate the creation of a complete virtual machine environment in Azure 1) […] The post Creating Resources in Azure Using Terraform appeared first on XTIVIA.| XTIVIA
Extending the Unified Data Plane: Pure Storage Now Azure Native by Pure Storage Blog Pure Storage Cloud Azure Native is now generally available. Learn more about this fully managed block volume as a service delivering Pure Storage enterprise-grade storage to Microsoft Azure. The post Extending the Unified Data Plane: Pure Storage Now Azure Native appeared first on Pure Storage Blog.| Pure Storage Blog
I am Plamen V., an award-winning freelance writer/poet with published works online and in a dozen US magazines. I have been writing since I was 10. I have won numerous writing contests and have awards from different parts of the world. I am a creative person with big dreams and also love to help people. … Continue reading "Plamen V." Source| Mediterranean Poetry
Identity threat detection and response startup Permiso Security Inc. today launched a new open-source tool aimed at simplifying one of the biggest pain points in cloud defense: inconsistent logging across platforms. Called P0LR Espresso, the first part short for P0 Labs Live Response, the framework normalizes cloud runtime logs to give security teams faster, clearer insights when […] The post Permiso launches open-source P0LR Espresso to normalize cloud logs for faster threat response app...| SiliconANGLE
Microsoft is rolling out Phase 2 of Azure services MFA enforcement starting October 1, 2025. This update requires MFA for all Azure Resource Manager operations. In this article, we dive into what you need to do to comply with the new enforcement requirements. The post Practical Protection: Microsoft Doubles Down on Azure MFA Enforcement appeared first on Practical 365.| Practical 365
En los últimos meses (o último año), todo el mundo habla de la Inteligencia Artificial (IA). Hay titulares que insisten en que la IA nos va a quitar el trabajo, que no está lo suficientemente madura o que las empresas no ven retorno de inversión (ROI). Pero, ¿sabes qué? Me parece que cuando hablamos así, detrás de esos grandes titulares, olvidamos lo que realmente importa: el para qué de la IA. Porque es justamente en los casos concretos, reales, donde la IA puede brillar.| JMFLORESZAZO
Azure Linux is Microsoft’s internal Linux distribution for 1st party services (cloud infra, IoT devices, etc.).| Tao of Mac
“Builders Month” busca soluções tecnológicas e oferece R$ 35.000 ao vencedor, além de US$ 250 mil em créditos de nuvem. Leia no Poder360.| Poder360
Cybersecurity expert Sami Laiho took the stage to deliver one of the most sobering yet insightful sessions of the CollabDays Finland 2025 conference. The talk covered everything from ransomware economics to AI impersonation, and painted a clear picture of the threats we... Continue Reading → The post Forward to the Past and Back to the Future – Cybercrime in 2024/2025 appeared first on Karl-Johan Spiik, Microsoft MVP.| Karl-Johan Spiik, Microsoft MVP
I´m currently working with a multinational company and their device management with Intune. They use delegated administration in Intune based on Scope Tags. In this blog, we’ll explore why scope tags are important, especially... The post Country based Intune Scope Tags with PowerShell or Azure Automation appeared first on Mr T-Bone´s Blog.| Mr T-Bone´s Blog
In the ever-evolving landscape of IT management, having real-time insights into the state of your devices is crucial. Microsoft Intune now provides a feature known as Device Query for multiple devices that allows IT... The post Brand new: Device Query for Multiple Devices in Intune appeared first on Mr T-Bone´s Blog.| Mr T-Bone´s Blog
Deciding that you want to move part or all of your environment to the cloud is only the first step in a broader IT modernization strategy. Businesses need…| TierPoint, LLC
This is part of my series on Network Security Perimeters: Network Security Perimeters – The Problem They Solve Network Security Perimeters – NSP Components Network Security Perimeters &…| Journey Of The Geek
Explore how Azure AI Foundry multi-agent systems enable enterprises to build digital workforces that handle complex workflows.| Smartbridge
Is your cloud bill spiraling out of control? Are you struggling to make sense of complex pricing models and discount options? You’re not alone. Many organizations miss out on significant cost savings by failing to leverage Reserved Instances (RIs), Committed Use Discounts (CUDs), and Savings Plans. These programs, offered by major cloud providers like AWS, […] The post Mastering Reserved Instances, Committed Use Discounts, and Savings Plans with XTIVIA appeared first on Virtual-DBA Remote...| Virtual-DBA Remote DBA Services & Support – Certified Database Experts
Learn how the Azure Developer CLI simplifies Azure Dev workflows, boosts productivity, and streamlines cloud development with easy-to-use commands.| Whizlabs Blog
In this article, we have explained how to identify workloads for deployment, run Linux and Windows workloads, and create Virtual Machines (VMs).| Whizlabs Blog
AZ-140 helps manage Azure Virtual Desktops efficiently for IT process management, optimization, & security. Check out this blog to understand the whereabouts.| Whizlabs Blog
In my current project, we receive messages from Azure Service Bus that we need to deliver to edge devices that are located all over the country. The| Conclusion AMIS Technology Blog
Reading Time: 2minutesFrom the corridors of national intelligence to frontline emergency responders, public agencies are under constant pressure: adapt to evolving threats, comply with ever-changing laws, and safeguard mission-critical systems—all while modernizing IT infrastructure and improving citizen services. But here’s the paradox:... The post Compliance, Cyber Threats, and National Security: The Data Playbook for Resilient Government appeared first on Data Management Blog - Data In...| Data Management Blog – Data Integration and Modern Data Management Articles...
Discover how to set up and manage Azure Virtual Desktop with Intune for cloud-only users, using Entra ID to simplify management in this article.| Parveen Singh - Microsoft Certified Trainer & Cloud Solutions Consultant
At DEF CON 33, NetSPI presented a talk about how Azure resources supporting Entra ID authentication expose tenant IDs, enabling attackers to attribute cloud resources to specific organizations at scale. The post We Know What You Did (in Azure) Last Summer appeared first on NetSPI.| NetSPI
Today, Microsoft and the US General Services Administration (GSA) announced a comprehensive agreement to bring a suite of productivity, cloud and AI services, including Microsoft 365 Copilot at no cost for up to 12 months for millions of existing Microsoft G5 users, to help agencies rapidly adopt secure and compliant advanced AI tools that will enhance...| The Official Microsoft Blog
From my last blogpost, I showcased how to setup Microsoft Connected Cache (MCC) for Enterprise on both Windows and Linux. There I suggested folks go with the Linux solution and that’s the assumption I’ve made for this blogpost. So why bother with the complexity of configuring HTTPS? There’re three strong arguments: Source It’s also a […] The post Microsoft Connected Cache for Enterprise and Education – HTTPS appeared first on Mindcore Techblog.| Mindcore Techblog
Microsoft colabora en un lucrativo proyecto con el Ejército israelí para almacenar más de 200 millones de horas de llamadas de personas palestinas en Gaza.| R3D: Red en Defensa de los Derechos Digitales
An on-premises environment can be limiting, but the public cloud doesn’t always offer the level of control some workloads require. Fortunately, you don’t need to make an either/or…| TierPoint, LLC
This is part of my series on Network Security Perimeters: Welcome back fellow geeks! Today I will be continuing my series on NSPs (Network Security Perimeters). In the last post I outlined the problems NSPs were built to solve. I covered how users of Azure have historically controlled inbound and outbound traffic for PaaS (platform-as-a-service) […]| Journey Of The Geek
This is part of my series on Network Security Perimeters: Network Security Perimeters – The Problem They Solve Network Security Perimeters – NSP Components Hello folks! Last month a muc…| Journey Of The Geek
Article Summary This blog explains how cloud database over-provisioning leads to excessive costs and offers practical strategies across AWS, Azure, and GCP to avoid it and optimize resource allocation. Introduction Cloud-managed databases offer incredible flexibility and scalability, but they can quickly become a budget drain if not managed correctly. One of the biggest pitfalls? Over-provisioning. It’s tempting […] The post Cloud Database Over-Provisioning: What You Need to Know appear...| Virtual-DBA Remote DBA Services & Support – Certified Database Experts
Today we’re excited to announce Azure Native Provider v3.8, featuring several enhancements that simplify authentication and extend support to private Azure environments. These updates make it easier than ever to manage Azure infrastructure using credentials provided by the hosting environment, such as in Azure Kubernetes Service (AKS), Azure VM, and Azure Cloud Shell. Simplified Authentication Across Environments The highlight of this release is a new authentication mode based on DefaultAzu...| Pulumi Blog
Azure Resource Manager (ARM) templates are powerful, but painful. If you’ve ever tried to provision cloud infrastructure using ARM, you know the challenges: Templates that started simple… and now span thousands of lines Manual configuration stitched together with bespoke deployment logic Lack of support for key services like Databricks Slow, error-prone deployments that require multiple manual steps No reuse, no testing, and no relief ARM wasn’t built for the complexity of modern Azure ...| Pulumi Blog
Discover why Azure private endpoints behave unexpectedly in hub-and-spoke networks by creating implicit routes across peered VNets, and learn effective solutions to maintain centralized traffic control through Azure Firewall.| NicolD blog
Databricks & Generative AI: Learn how to transform data into intelligent solutions with large language models, RAG, and scalable AI workflows.| HatchWorks AI
Microsoft endurecerá la seguridad de Azure de forma escalonada y obligará al uso de MFA (autenticación multifactor) en la gestión […]| OpenSecurity
Simplify Azure cloud monitoring with PRTG. Learn how to integrate metrics for streamlined performance tracking and proactive capacity management in your hybrid IT environment.| blog.paessler.com
Which cloud computing companies offer superior services? See our list of 2025's top cloud providers.| Datamation
Background Many customers have gone down the route of developing, publishing and sharing internally developed Azure IaC modules within the organization. The modules can be written in Bicep, or Terraform or other IaC languages.| Managing Cloud and Datacenter by Tao Yang
Something that flew under my radar this summer was the release of Microsoft Connected Cache for Enterprise and Education. Originally, Configuration Manager (SCCM) had a Connected Cache functionality through its Distribution Points. This is something I’ve successfully deployed before and actually works great by caching content on-premises so clients can benefit from Delivery Optimization features […] The post Microsoft Connected Cache for Enterprise and Education – Deployment guide appea...| Mindcore Techblog
In previous blogposts, I’ve described how we can use the OpenSSH extension through Azure Arc to gain better remote SSH and RDP sessions to machines without requiring direct network access. However, they’ve always required we login to the machine with local credentials (or domain, but that’s old school, we want to get away from that). […] The post Modern Server Management – Azure Arc RDP with Entra ID Authentication appeared first on Mindcore Techblog.| Mindcore Techblog
With the recent generally available Entra ID functionality into Bicep while I was on vacation, I couldn’t wait to get back and try it out. Specifically, I wanted to see if using this functionality would allow for some level of Infrastructure as code (IaC) to good ol’ Active Directory when combined with Group Writeback using […]| Mindcore Techblog
API Management helps organizations publish APIs to external.| iO tech_hub
﷽| cocomelonc
Explore how generative AI is revolutionizing bionic manufacturing, offering 7 key advantages for improved production. Learn more.| Govindhtech
Agentic DevOps isn’t just a productivity boost. It’s a shift in how software projects are delivered. Projects that used to take weeks can now move at the pace of days.| Smartbridge
Sometimes, you need access to OpenAI models fronted by Azure API management when you're building GenAI solutions on Databricks. Rule number one: don't panic.| Port 1433
I realized I never created a post to show how to deploy Terraform from VS Code. I haven’t done that in a while because I don’t do it at work. We have Azure DevOps pipelines to handle that, but I like to test my code…| sqlkitty
Learn how to enable Entra ID-based SSH logins for Linux servers managed with Azure Arc. Eliminate SSH key sprawl, improve auditing, and enforce Conditional Access, RBAC, and MFA for secure, streamlined remote access.| Mindcore Techblog
I recently had to copy an Azure SQL database (SQL db) from one subscription to an Azure SQL Server instance ... Continue reading| SQL Studies
This post looks at implementing a cookie reset in an ASP.NET Core application using Duende identity server which federates to Entra ID. Sometimes cookies need to be reset for end users due to size problems, or unknown remote authentication server errors. The cookies can be cleared and a new sign in can be forced. Code: […]| Software Engineering
Having trouble viewing the text? You can always read the original article here: Key Takeaways from Microsoft’s Business Applications Partner Summit 2025 TL;DR TMC attended Microsoft’s exclusive Biz Apps Partner Executive Summit 2025 in Bellevue to bring back real-time updates and priorities from Microsoft leadership. The focus of the event was clear: Microsoft is formally shifting to an AI Business Solutions model, with built-in AI agents now standard across Dynamics 365 and Business Cent...| Technology Management Concepts
Having trouble viewing the text? You can always read the original article here: Inside TMC’s 2025 Retreat and What It Means for the Future We just returned from our annual TMC company retreat — refreshed, reconnected, and more energized than ever. For many, company retreats are about team bonding and recharging (and yes, we did plenty of that — more on the bocce ball battles and dog gift basket in a minute). But at TMC, our retreat [...] We love your comments! Leave one at the post he...| Technology Management Concepts
Having trouble viewing the text? You can always read the original article here: Directions North America 2025 Recap This year’s Directions North America conference marked a major milestone for TMC as we officially launched our AI-First Microsoft Partner initiative. From thought-provoking keynotes to hands-on discussions with our ISV partners, one thing was clear: AI isn’t just a tool—it’s the foundation for how we move forward. The Mindset Shift – From “What [...] We love your c...| Technology Management Concepts
At PeerDB, we are building a fast and a cost-effective way to replicate data from Postgres to Data Warehouses and Queues. Today we are releasing our Azure Event Hubs connector. With this, you get a fast, simple, and reliable way to Change Data Captur...| PeerDB Blog
At PeerDB, we are building a fast and a cost-effective way to replicate data from Postgres to Data Warehouses such as Snowflake, BigQuery, ClickHouse, Postgres and so on. All our customers run Postgres at the heart of the data stack, running fully ma...| PeerDB Blog
I have updated the AzPolicyTest PowerShell module (GitHub, PowerShell Gallery) to v2.8.0. This release includes the following updates:| Managing Cloud and Datacenter by Tao Yang
Once a SQL Managed Instance (SQL MI) is created, you can connect to the managed instance using SQL Server Management Studio (SSMS). There are 2 ways a database can be created on the SQL MI instance:| Managing Cloud and Datacenter by Tao Yang
A common question about Azure Policy I frequently get asked during customer engagements is how can a user find out what restrictions are applied for a given resource in their landing zones.| Managing Cloud and Datacenter by Tao Yang
Introduction| Managing Cloud and Datacenter by Tao Yang
I have previously blogged Using Azure Policy to create DNS records for Private Endpoints.. The problem with these policies are they are largely the same. If you create individual policy definitions for each Azure service that supports Private Endpoints, you will end up with a lot of policy definitions that are almost identical.| Managing Cloud and Datacenter by Tao Yang
Explore how to securely manage remote access to Linux servers using Azure Arc and Entra ID in Part 2 of our series. Learn how to eliminate VPNs and jump hosts with RBAC, PIM, Conditional Access, and SSH key automation for a Zero Trust architecture.| Mindcore Techblog
Creating a Microsoft Active Directory Certificate Services with Azure Blob Storage can help achieve high availability and low latency. It is easier to manage.| Encryption Consulting
Lately, I've been interested in how third party vendors can best authenticateinto their customers' cloud accounts. The status quo in AWS is usually role assumptionfrom the vendor's account to the customers', but what about GCP and Azure? CanOIDC be used to authenticate into all three clouds in approximately the same way?I think the answer is yes, and this blog post aims to show how to do so.| Aidan Steele's blog (usually about AWS)
Discover the costly AFA tax affecting your IT budget. Learn how to avoid hidden fees and explore effective alternatives.| StorageSwiss.com - The Home of Storage Switzerland
This is part of my series on DNS in Microsoft Azure. DNS in Microsoft Azure – Azure-provided DNS DNS in Microsoft Azure – Azure Private DNS DNS in Microsoft Azure – Azure Private …| Journey Of The Geek
If you are using Azure Front Door, the need for a WAF policy that rate limits or blocks access to certain IP addresses might arise. Using the correct parameters in the WAF policy is crucial to…| Web-Performance Blog
A guide for creating an Azure Key Vault, inserting, retrieving, updating and deleting secrets using the Azure CLI.| Vuyisile Ndlovu
In this article, I would like to point out options to identify, monitor and avoid persistent access on Managed Identities privileges by adding federated credentials on User-Assigned Managed Identities (UAMI) from malicious or unauthorized entities. We will also have a quick look at attack paths and privileges which should be considered.| Thomas Naunheim
In the recent parts of the blog post series, we have gone through the various capabilities to detect threats and fine-tune incident enrichment of Workload Identities in Microsoft Entra. This time, we will start to automate the incident response for tackling malicious activities and threats. This includes the usage of Conditional Access for Workload ID but also configuring a Microsoft Sentinel Playbook with the least privileges.| Thomas Naunheim
Attack techniques has shown that service principals will be used for initial and persistent access to create a backdoor in Microsoft Entra ID. This has been used, for example as part of the NOBELIUM attack path. Abuse of privileged Workload identities for exfiltration and privilege escalation are just another further steps in such attack scenarios. In this part, we will have a closer look on monitoring workload identities with Identity Threat Detection Response (ITDR) by Microsoft Defender XD...| Thomas Naunheim
It has been a while since I updated my blog. So I figured it was time to do some maintenance. Upgrading Hugo to the latest version, adding a few HTML tweaks for things that bothered me and most importantly, locking down the front door of my blog. After reading Easily adding Security Headers to your ASP.NET Core web app and getting an A grade by Scott Hanselman, I decided to take a look at my own blog and see how I could improve the security headers.| CloudAppie
What is Azure Arc Azure Arc is a Microsoft service that extends your Azure management and governance capabilities to your resources outside of Azure, and this can include on-premises servers, virtual machines, and other cloud environments. With Azure Arc, you can centrally manage, secure, and automate workloads across hybrid and multi-cloud environments using familiar Azure […] The post Azure Arc & Hybrid Workers – Simplifying Hybrid Cloud Automation Pr.1 appeared first on Mindcore Techblog.| Mindcore Techblog
In this first Azure Arc Remote Management focused blogpost, let’s cover the OpenSSH extension and how it can be used to get a remote PowerShell connection over SSH and even a Remote Desktop Session, all without any direct network connectivity. The best part: It costs absolutely nothing! Join me in this adventure to more securely […] The post Modern Server Management with Azure Arc – Remote Management Pt.1 (SSH/RDP) appeared first on Mindcore Techblog.| Mindcore Techblog
Managing permissions for Managed Identities in Azure/Entra ID has been a long-standing challenge. Microsoft has yet not provided a built-in interface for this, leaving administrators reliant on PowerShell to handle permissions – even if the “same” exists for App Registrations and Enterprise Applications. To bridge this gap, I developed this PowerShell-based tool to the community […] The post Entra ID – Managed Identity Permission Manager appeared first on Mindcore Techblog.| Mindcore Techblog
With the release of DCSv3, I was excited to give it a try at-scale but since it hasn’t been integrated into Azure Machine Configuration (yet…) I figured I’d try a different approach to deploying and testing it. A lesser-known feature of Azure and Arc machines are Run Commands. Typically used for quick diagnoses or troubleshooting […] The post Modern Server Management – Exploring Azure Arc Run Commands using Bicep appeared first on Mindcore Techblog.| Mindcore Techblog
What is DKIM? DKIM stands for DomainKeys Identified Mail and is an email autentication method. It helps the receiving mail server to verify whether an email have been sent from an allowed email server or not. The idea of DKIM is that the senders email servers are signing all outgoing messages with asymmetric encryption. The […] The post What is DKIM and how do you enable IT in Microsoft 365? first appeared on TzuSec.com.| TzuSec.com
This guide will help you prepare your CentOS 7 server for a migration from on-premise to Microsoft Azure cloud. It can be a bit tricky to get everything to work correctly and personally I didn’t find Microsofts guides to be great so I write this post to help you with the steps that is needed […] The post How to prepare your CentOS 7 machine to Microsoft Azure first appeared on TzuSec.com.| TzuSec.com
This guide will help you prepare your CentOS 6 server for a migration from on-premise to Microsoft Azure cloud. It can be a bit tricky to get everything to work correctly and personally I didn’t find Microsofts guides to be great so I write this post to help you with the steps that is needed […] The post How to prepare your CentOS 6 machine to Microsoft Azure first appeared on TzuSec.com.| TzuSec.com
Aprende cómo desplegar Jenkins sobre Azure Kubernetes Service utilizando instancias Spot para maximizar el ahorro sin perder rendimiento. Una guía práctica, 100% CLI, que combina automatización eficiente, resiliencia cloud-native y troubleshooting real en producción.| JMFLORESZAZO
Ejemplo| JMFLORESZAZO
Bicep で Azure Container Apps と Jobs を構築したので、使い分けと実際のBicep でのパラメータとインフラを構築する方法を説明します。Azure Container Appsは、サーバーレスなコンテナプラットフォームで、コンテナー化されたアプリケーションを実行するため、保守が容易でコスト削減できます。Azure Container Apps Jobsは、タスクベースのワークロードに特化したサーバーレスコンテ...| SIOS Tech.Lab
A recent change in the SqlServer PowerShell module has given me a headache this week. I’m running the module with Azure DevOps in a pipeline that is triggering an Azure deployment script within a network-integrated container instance. The problem this error. Workaround This change causes my Invoke-Sqlcmd command to fail, which was luckily already covered […] Source| Web-Performance Blog
Recently I saw intermittent failures of a Python script. However, in my Azure DevOps pipeline, I don’t really knowingly use Python. After today, it just kept consistently failing, which led me to research this issue with the Azure CLI. I ran into this issue, and after not too long searching, I could already find an […] Source| Web-Performance Blog
I started seeing a new issue on June 10th, 2025 that my Azure App Service staging slot was created with the name “staging”, but it became “stagingd5a1” in the domain name. So four seemingly random characters were added to my azure app service deployment slot name. This became a problem as my pipeline is running […] Source| Web-Performance Blog
This post walks you through settings up error logging and auditing for your Azure SQL DBs, which is easy with diagnostic settings.| sqlkitty
Bei der Oracle Datenbank gibt es mehrere verschiedene Editionen mit unterschiedlichen Lizenzierungskriterien:| Database Blog
Modernisez votre intégration ! Découvrez comment migrer BizTalk vers Azure Integration Services pour plus de flexibilité et de scalabilité| Le blog de Cellenza
Cuando sabes que tu aplicación va a ir a producción en Kubernetes desde el minuto cero, lo último que quieres es mantener un docker-compose.yml, un .aspire.app, un conjunto de manifiestos k8s/, y encima repetir la configuración en CI/CD. La tentación de crear “entornos de desarrollo paralelos” es alta, pero el coste a medio plazo también lo es.| JMFLORESZAZO
Problem Statement I have seen many professionals,especially those new to Azure, often get confused between Log Analytics and Log Analytics Workspace during Microsoft Sentinel deployment. This confusion can lead to inefficient setups, increased costs, and suboptimal security postures. Being a security SME it’s crucial to share my personal and hands on expertise to avoid future confusions.Let’s break down these concepts to eliminate any ambiguity. Understanding Log Analytics Log Analytics i...| hugs4bugs
Before jump over the onboarding of Microsoft Sentinel, let’s understand what MS Sentinel is? Definition: Microsoft Sentinel is a cloud native SIEM(Security information and Event Management) and SOAR(Security orchestration,automation,and response) solution,which delivers intelligent security analytics and threat intelligence. Why do we use it? To act as blue teaming as defensive security against attack detection,threat visibility,proactive hunting and threat response. In this blog we’ll be...| hugs4bugs
Let’s understand what exactly MDC or Microsoft Defender for Cloud is? Microsoft Defender for Cloud is CNAPP tool. CNAPP == Cloud Native Application Protection Platform So, MDC is cloud native CNAPP tool with a set of security best practices and measures to protect cloud based APPs, Servers , API and resources. It comes with the 3 loaded features DevSecOps CSPM CWPP It has 3 plans viz free one, Defender for servers P1 and P2 First let’s understand the problem statement from different stake...| hugs4bugs
Before starting let’s understand a few steps of threat investigation and attackers’ mindset. Whenever attacker breaches a system or try to all logs are generated as Events and Incidents which can be fetched into SIEM tools like MS Sentinel , Qradar. These behaviours can be summarised into TTP viz Tactics : The high level description of the behaviour and strategy of a threat actor.It means how they behave across the different stages of the cyberattack kill chain. Usually these stages inclu...| hugs4bugs
I have a customer that uses Intune AutoPatch and wanted to add devices to groups based on domain suffix of the primary user. So I started to add this functionality to my popular script...| Mr T-Bone´s Blog
Microsoft Azure is probably the most widely used cloud platform in Switzerland, powering businesses of all sizes, from startups to multinational companies. According the the official Microsoft page over 95% of Fortune 500 companies rely on Microsoft Azure in one form or another. With this industry-wide adoption, it has become a critical component of modern-day IT infrastructure. However, as more and more companies migrate to cloud or cloud-local hybrid infrastructure, the security risks that ...| blog.compass-security.com
Infrastructure as Code (IaC) has evolved beyond simple automation into a fundamental shift toward applying software engineering practices to infrastructure management. In 2025, leading organizations aren’t just provisioning infrastructure—they’re treating it as software, complete with testing, version control, code reviews, and continuous integration. As infrastructure complexity grows, teams increasingly seek approaches that provide the same developer productivity tools they use for ap...| Pulumi Blog
For my Labs, I often need to create and build virtual machines. Many virtual machines :-). One of the most “popular” machine recently is for me the web server. The requirement for my needs is often very simple: create a web server that responds on port 80, that is able to make me understand “what machine I’m interacting with”, so, the ideal response message to the request http://my-machine-ip should be “myMachineName”.| NicolD blog
Terraform Remote State Using Azure Storage Recently, I needed to set up a shared Terraform workflow where state could be […]| Vuyisile Ndlovu
Using Cloudflare Origin Certificates within Azure App Services using a pfx via openssl| Scott Brady - scottbrady.io
Streamline Azure Entra ID Groups access reviews to manage user permissions efficiently and boost security, compliance, and operational control.| SysOpsTechnix
Context| Techdecline's Blog