Discover internet-exposed assets with Microsoft Defender EASM in AzureIn this article, I will give some context and demonstrate how to kick-start your journey to get a holistic view of your own or others’…Dec 15, 2022Dec 15, 2022
Microsoft Most Valuable Professional: more than a trophy? 🏆The Microsoft MVP Award, is a prestigious award by the leading technology company Microsoft Corporation, signed by CEO — Satya Nadella…Sep 8, 2022Sep 8, 2022
Microsoft CommunityI am honored to have received the request, trust, and support to establish and organize the Microsoft Security User Group with a great team…Apr 22, 2022Apr 22, 2022
Cloud, AI, IoT, VR, and 3D printing — all in one hackathon.Insights into the Arctic Cloud Developer Challenge 2022.Feb 17, 2022Feb 17, 2022
Sustainability on 1.2.3 + technologyI welcome you to a light touch on sustainability and sustainable technology. We will touch upon defining sustainability, the three pillars…Feb 1, 2022Feb 1, 2022
Log4j not so technicalIT-Security experts, administrators and developers have been working around the clock lately due to a critical vulnerability discovered in…Dec 14, 2021Dec 14, 2021
Do not believe your mobile-app source code is a protected assetIt is interesting to see how companies and organizations believe that their mobile application source code is a protected asset. Protected…Feb 20, 2021Feb 20, 2021
Cyber Security — coping with Covid-19s effect on organizations digital transformationZero Trust (ZT), Endpoint protection (EPP), and Cloud Access Security Broker (CASB) are topics this article will touch upon related to…Jan 13, 2021Jan 13, 2021
Cloud-native app developmentIn today’s application development, it is common to encounter terms like microservices, containers, virtual machines (VMs), orchestrations…Nov 11, 2020Nov 11, 2020
DevOps, DevSecOps, and DataOps, it is all about the “Ops” in 2020This article will give you a small introduction to DevOps, DevSecOps, and DataOps.Let’s break the terms down to details:Mar 5, 2020Mar 5, 2020