20 Agosto 2025
[In preview] Public Preview: Azure Bastion now supports connectivity to private AKS clusters via tunneling

With this release, you can now establish a secure tunnel from your local machine—via Azure Bastion—directly to your AKS API server using your standard Kubernetes tooling. This enables seamless access to both private clusters and public clusters with API s Source: Microsoft Azure – aggiornamenti

Read More
20 Agosto 2025
[In preview] Public Preview: Azure NetApp Files Flexible service level now supports cool access

Flexible service level in Azure NetApp Files allows customers to independently configure storage capacity and throughput, making it ideal for workloads with unique performance and sizing requirements—such as high-capacity volumes with low throughput or lo Source: Microsoft Azure – aggiornamenti

Read More
20 Agosto 2025
Retirement: Microsoft Defender for Cloud Deprecation in Microsoft Azure Operated by 21Vianet Announcement

We continuously assess our services to uphold the high standards of protection and reliability for our customers. After a thorough evaluation, we have determined that due to increasing infrastructure and operational complexity, it is no longer feasible to Source: Microsoft Azure – aggiornamenti

Read More
20 Agosto 2025
Retirement: Microsoft Sentinel Deprecation in Microsoft Azure operated by 21Vianet Announcement

We continuously assess our services to uphold the high standards of protection and reliability for our customers. After a thorough evaluation, we have determined that due to increasing infrastructure and operational complexity, it is no longer feasible to Source: Microsoft Azure – aggiornamenti

Read More
20 Agosto 2025
Quantum-safe security: Progress towards next-generation cryptography

Quantum computing promises transformative advancements, yet it also poses a very real risk to today’s cryptographic security. In the future scalable quantum computing could break public-key cryptography methods currently in use and undermine digital signatures, resulting in compromised authentication systems and identity verification. Starting your journey to become[…]

Read More