Notebooks are gaining popularity in InfoSec. Used interactively for investigations and hunting or as scheduled processing jobs, notebooks offer plenty[…]
Read More
Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure[…]
Read MoreCross Subscription Restore for Azure Virtual Machines is provides flexibility to choose any subscription during restore. Source: Microsoft Azure –[…]
Read More
Medical imaging has long been at the forefront of the adoption of digital tools in healthcare. Over the past three[…]
Read MoreShareable links allows users to connect to target resources via Azure Bastion without access to the Azure portal. Source: Microsoft[…]
Read MoreAzure IoT Hub now supports the ability to setup an Azure Cosmos DB account as a custom endpoint. This will[…]
Read More