To view or add a comment, sign in
More articles by Mo . ✔️☁️
-
Tips for azure MonitorJan 31, 2024
Tips for azure Monitor
In the ever-evolving landscape of cloud computing, efficient monitoring is the key to maintaining optimal performance…
15
2 Comments -
Monitoring in AzureJan 9, 2024
Monitoring in Azure
If your organization asked you to design a monitoring strategy to cover all of its teIf your organization asked you to…
30
-
Sustainability and ITAug 10, 2023
Sustainability and IT
Over the past several years, organizations have had to adjust quickly to unprecedented, unpredictable pressures…
6
-
EU-U.S. data agreement an important milestone for data protection, Microsoft is committed to doing our partJul 10, 2023
EU-U.S. data agreement an important milestone for data protection, Microsoft is committed to doing our part
The newly announced Trans-Atlantic Data Privacy Framework between the EU and U.S.
3
-
Scrum : the Basics - Part 1Sep 6, 2021
Scrum : the Basics - Part 1
the Agile Method Allow teams to self -Organize they will do a much better job working on the design and tests from the…
8
-
Azure InfraSep 28, 2020
Azure Infra
1-Azure Monitor collects two types of data: metrics and logs. Metrics are numerical values that describe some aspect of…
15
-
Connecting a local FortiGate to an Azure VNet VPNApr 20, 2020
Connecting a local FortiGate to an Azure VNet VPN
This recipe provides a sample configuration of a site-to-site VPN connection from a local FortiGate to an Azure VNet…
10
-
What is Azure AD Identity Protection?Jul 8, 2018
What is Azure AD Identity Protection?
Microsoft claims that 60% of all successful attacks rely on compromised credentials, so extra care needs to be taken to…
8
-
History of the deployment models (Azure)Jun 18, 2018
History of the deployment models (Azure)
#Azure originally provided only the classic deployment model. In this model, each resource existed independently; there…
-
Planning Azure AD Connect for multi-forest scenariosJun 10, 2018
Planning Azure AD Connect for multi-forest scenarios
more complex organizations it is common to have more than one Active Directory forest on-premises. For example, if an…
Insights from the community
-
Computer NetworkingWhat are the most effective DNSSEC key management practices?
-
Cloud ComputingWhich cloud security solutions offer the most advanced threat detection capabilities?
-
Network SecurityHow can you protect TCP in a cloud environment?
-
Network SecurityYou're responsible for cloud security. What's the best way to prevent intrusion?
-
EntrepreneurshipHow can you ensure that a SaaS company's minimum viable product is secure?
-
CybersecurityWhat are the top vulnerability scanning services for IT system security?
-
Technical DesignHow do you secure your load balancers and prevent unauthorized access or attacks?
-
Computer NetworkingHow can you effectively monitor and manage a Cloud Access Security Broker?
-
Application SecurityHow do you use API gateways and firewalls to protect your RESTful APIs?
-
Internet ServicesWhat security measures should you take during a server migration?
Others also viewed
-
Fortifying Your Digital Fortress: A Comprehensive Guide to Azure's Advanced Security Solutions
Surendra Bairagi 1y -
🌥️ Cloud-Based Attacks: Understanding the Risks and Mitigation Strategies
Aditi Patil 1mo -
Azure for Architects: Part5 — Security
Hamdy A. AbdulFatah 1mo -
Secure your Azure subscription
Eran Shpigelman 2y -
Safeguarding Applications with AWS GuardDuty and Security Hub.
Sudheer Kumar Jammana 1y -
Lessons from the Recent Microsoft Azure Outage: (AI in Cybersecurity)
Mark T. 11mo -
Protecting Your S3 Data: Strategies to Avoid Data Loss and Enhance Security
Stephen Jones 10mo -
Microsoft end-to-end Security - Microsoft Purview
Matthew Clarke 1y -
Azure Fundamentals Tips and Tricks: Security and Exam Readiness
Sayed Saad 1y -
Cloud Native Security: Reduce Risk in the Enterprise
Jesse Tate Pulfer 7y
great points !! Thanks