Author: zigmax
-
AKS | CNCF Quebec Meetup
Read more: AKS | CNCF Quebec MeetupHi, I am thrilled to share that I had the opportunity to speak at the CNCF Québec meetup this week. My presentation focused on the various security vectors that a…
-
AKS | Istio-based service mesh add-on
Read more: AKS | Istio-based service mesh add-onHi!, As cloud-native applications continue to become more complex, managing the communication between services in a microservices architecture becomes a challenge. Service mesh technology offers a solution to this challenge…
-
Microsoft Defender for DevOps – Overview
Read more: Microsoft Defender for DevOps – OverviewHi, In today’s fast-paced software development landscape, security has become a top priority for DevOps teams. Security breaches can cause significant financial loss, damage to reputation, and loss of trust…
-
Malware Scanning for Defender for Storage
Read more: Malware Scanning for Defender for StorageHi, The malware scanning feature in Microsoft Defender for Storage scans files stored in Azure Blob Storage and Azure Files to detect and remove malware. The scanning process is automatic…
-
New alert in Azure Defender for Key Vault
Read more: New alert in Azure Defender for Key VaultHi! Azure Defender for Key Vault has the following new alert: Alert (alert type) Description MITRE tactics Severity Denied access from a suspicious IP to a key vault(KV_SuspiciousIPAccessDenied) An unsuccessful…
-
AKS | Pod Sandboxing
Read more: AKS | Pod SandboxingHi! In a traditional Kubernetes cluster, pods share the same node and therefore have the same level of access to the host system. This can lead to potential security risks,…