Microsoft Adds Bevy of Cloud-Native Services to Azure
Microsoft added a slew of capabilities to simplify building, deploying and managing cloud-native apps in its Azure cloud computing service... read more
Join us
Microsoft added a slew of capabilities to simplify building, deploying and managing cloud-native apps in its Azure cloud computing service... read more

Hey, sign up or sign in to add a reaction to my post.
Cloud Workstations, now GA, enables faster developer onboarding and increased productivity with an enhanced security posture... read more

Hey, sign up or sign in to add a reaction to my post.
To launch the collaboration, XContent is offering a complimentary Orca Security Score assessment, where companies can evaluate their cloud security posture and identify areas of vulnerability... read more

Hey, sign up or sign in to add a reaction to my post.
Azure IPVLAN for Docker containers can be confusing. Simply put, the host forwards and receives specific destination IP packets to the container. The IPVLAN works best when a container is completely separate from the host's IP address space. An alternative approach to using static routes is to use s.. read more
Hey, sign up or sign in to add a reaction to my post.
A blog post on securing AKS cluster with Azure Front Door and Private Link Service, discusses using different options to increase cluster security. It covers secure ingress setup using private link service, SSL termination with NGINX ingress controller, and the ability to store Kubernetes secrets in.. read more

Hey, sign up or sign in to add a reaction to my post.
There are three types of cloud encryption: data-at-rest, data-in-transit, and data-in-use. Encryption algorithms include symmetric and asymmetric encryption. Cloud encryption provides security, compliance, integrity, and risk reduction benefits, but challenges include time, expense, data loss, and k.. read more

Hey, sign up or sign in to add a reaction to my post.
Article on cloud native security principles and best practices to protect cloud environments using a combination of tools and technology. Includes key principles like devsecop, microservice architecture, automation, immutable infrastructure and zero trust security, as well as common challenges faced.. read more

Hey, sign up or sign in to add a reaction to my post.
This post walks through a timeline of how cloud security has grown over recent years to combat new and upcoming risks associated with its use. Following this timeline, security leaders can implement the latest in cloud security based on their own unique business requirements... read more

Hey, sign up or sign in to add a reaction to my post.
How feasible is high-reliability perfection and does it actually make a difference? In his latest blog for SHP, Dom Cooper unpacks the theory’s implementation and impact... read more

Hey, sign up or sign in to add a reaction to my post.
What does it mean to build a successful networking team? Is it hiring a team of CCIEs? Is it making sure candidates know public cloud inside and out? Or maybe it’s making sure candidates have only the most sophisticated project experience on their resume. In this post, the author discusses what a su.. read more

Hey, sign up or sign in to add a reaction to my post.
This tool doesn't have a detailed description yet. If you are the administrator of this tool, please claim this page and edit it.
Hey there! 👋
I created FAUN.dev(), an effortless, straightforward way for busy developers to keep up with the technologies they love 🚀
