Azure Digital Twin and its use cases

Azure Digital Twin is a cloud-based platform service that enables users to model and simulate the physical environment and connected devices in the Internet of Things (IoT). It allows users to create a virtual representation of a physical environment, including the relationships and interactions between objects and devices within that environment. Using Azure Digital Twin,... Continue Reading →

Azure Web Application Firewall (WAF) explained

Let us understand OWASP first The Open Web Application Security Project (OWASP) is a nonprofit organization that works to improve the security of software and the internet. OWASP provides a range of resources, including guidelines, tools, and training materials, to help developers and organizations build and maintain secure applications. One of the main resources provided... Continue Reading →

Update on Dependency Injection (DI) with C#

Dependency injection (DI) is a design pattern that allows a class to receive its dependencies from the outside, rather than creating them itself. This can help to improve the testability, flexibility, and modularity of an application. In .NET Core, dependency injection is implemented using the Microsoft.Extensions.DependencyInjection package. To use dependency injection in a .NET Core... Continue Reading →

Microsoft defender for Cloud (DevOps) & SonarQube

Microsoft Defender for Cloud is a security solution that provides protection for cloud-based workloads, including Azure infrastructure and applications. Microsoft Defender for Cloud uses advanced security technologies and threat intelligence to help protect against cyber threats, including malware, phishing, and ransomware attacks. Microsoft Defender for Cloud can be integrated with Azure DevOps to provide security... Continue Reading →

What is DevSecOps exactly?

DevSecOps is a term that refers to the integration of security practices into the software development and operations process. It is based on the principles of DevOps, which is a collaborative approach to software development that focuses on continuous integration, delivery, and deployment. In the context of DevSecOps, security is treated as an integral part... Continue Reading →

Monitoring with Azure and Arc enabled resources

Continuous monitoring is the practice of continuously monitoring your IT systems and infrastructure to detect and respond to security threats and operational issues. With Azure Arc enabled resources, you can use Azure Monitor to implement continuous monitoring for your hybrid and multicloud environments. To set up continuous monitoring with Azure Arc enabled resources, you can... Continue Reading →

Checkov vs tfsec Terraform testing framework

Checkov is an open source static code analysis tool for infrastructure as code (IaC) that helps you to ensure that your Terraform, CloudFormation, and Kubernetes resource configurations adhere to best practices and are secure. It scans your IaC code and flags potential security issues, such as exposed secrets, unencrypted data at rest, and open firewall... Continue Reading →

Create a website or blog at WordPress.com

Up ↑