Blog

Beyond Protection: The Role of the Azure Network Security Hub

Azure recently rebranded Firewall Manager and added more network security services, introducing a new experience called “Azure Network Security Hub”. The Network Security Hub is a centralised interface that brings Azure Firewall, Web Application Firewall (WAF), and DDoS Protection into one place. This change is part of a broader effort to simplify the Azure Networking portfolio and better align…

Read More

The Technology Powering Azure Firewall Prescaling for Cloud Resilience

Azure Firewall is a cloud-native security service that provides workload and threat protection for cloud workloads. Azure Firewall helps inspect traffic for both east-west and north-south traffic across workloads and services. Azure Firewall is available in three SKUs: Basic, Standard, and Premium. To learn more about the Azure firewall, visit the Microsoft page. Dynamic Scaling: Azure Firewall earlier supported…

Read More

Enhancement of Network Monitoring: Azure Network Watcher in Action

Welcome to my next blog post with a deep dive into the depths of Azure Network Watcher. This post will discover the powerful features and insights this tool offers to optimise and monitor your network performance like never before. Let’s explore the functionalities that can help you troubleshoot issues, analyse network traffic, and ensure the robust security of your…

Read More

The Invisible Shield of Network Security Perimeter in Azure PaaS

Welcome to my blog! In this post, I will give you a comprehensive overview of Azure Network Security Perimeter (NSP) services. Announced at last year’s MS Ignite and recently made generally available, this service offers unique features that distinguish it from other options. Let’s explore its key attributes and understand their significance in enhancing Azure PaaS network security. Understanding…

Read More

Transform Container Security with Microsoft Defender for Container.

The adoption of containerised applications has surged due to their flexibility, scalability, and efficiency. However, this growth also brings new security challenges. Containers often operate in shared environments, increasing the risk of vulnerabilities and potential threats from both internal and external sources. With the adoption of Zero Trust, we need to detect and prevent unauthorised access and attacks on…

Read More

How Copilot in Azure Can Master Your Networking Challenges?

In this blog, I will discuss how Copilot in Azure helps you work with network resources in different situations. Copilot in Azure serves as an intelligent assistant designed to enhance your experience with Azure’s cloud services. It assists users in designing, migrating, monitoring, and optimising their Azure environments. Copilot is a valuable tool that assists with Azure services in…

Read More

New Approaches to Safeguarding AI Workloads in Azure using Defender

Artificial intelligence (AI) has become increasingly prominent across various sectors, showcasing its transformative potential. For instance, generative AI technologies, such as language models, are now being utilised in various fields and organisations. Additionally, concerns regarding the security of AI workloads have sparked significant discussions. Developers are particularly concerned as attackers increasingly seek to exploit applications to manipulate AI workloads,…

Read More

How to Use a Pricing Calculator to Maximize Your Defender for Cloud Investment

Microsoft has introduced a cost calculator designed to help customers estimate expenses related to Microsoft Defender for Cloud (MDC) services. This tool offers a straightforward and precise way to analyse the potential costs, enabling effective planning and budgeting for cloud resources security needs. Introduction The MDC cost calculator provides an easy way to estimate costs, allowing users to define…

Read More

How to master in Azure networking for Azure Kubernetes Services (AKS)? – Part 2

Welcome to the second post in my series on Azure networking with the Azure Kubernetes Service (AKS). In the inaugural blog post, I explored several key networking configurations designed to enhance the security of workloads running in Azure Kubernetes Service (AKS). The first post has the following topics: In this post, I will delve into the following essential topics…

Read More

Verified by MonsterInsights