3004, 2019

Data Discovery and Classification for Azure SQL Data Warehouse public preview

By |April 30th, 2019|Cloud Monitoring, General, IT Management, Microsoft Azure|0 Comments

Azure SQL Data Warehouse is a secure cloud data solution tuned for fast and flexible complex queries across enterprise workloads. While it has become a critical pain-point to address the issues of discovery, classification, and protection of client sensitive data Microsoft announced the public preview of Data Discovery & Classification for Azure SQL Data Warehouse. […]

2008, 2018

Azure Secrets on GitHub Repositories

By |August 20th, 2018|IT Management, Microsoft Azure|0 Comments


Developers worldwide host their projects on GitHub with the majority using GitHub public repositories for their open source work. While being a great way to contribute to the community, it does come with things to keep in mind. Particularly around managing credentials and other things.

Azure secrets include authentication credentials that should not be made publicly available […]

1508, 2018

Windows Azure – Secure Your Connection String

By |August 15th, 2018|Microsoft Azure|0 Comments


In this blog post, we are going to cover how to import the private key to Windows Azure.

In this technique, there is a role of the Windows Azure administrator who is the private key holder. His main task is to:

Make the private/public key pair and select a password to secure the private key
Backup […]

1806, 2018

Technical Method To Disable SSL 3.0 In Azure Machines

By |June 18th, 2018|Azure How To, IT Management, Microsoft Azure|0 Comments

Security is the ultimate goal of Microsoft Azure as customers want a highly protected environment for work. SSL 3.0 was a major vulnerability observed in Azure machines and websites. It was not limited to one or two types of machines, but all websites and Windows Virtual machines got vulnerable. To ensure the safety of the […]

706, 2018

Enhance security of Azure Storage

By |June 7th, 2018|Azure How To, Cloud Platforms, IT Management, Microsoft Azure|0 Comments

Azure Storage account users can now benefit from “Secure Transfer Required” option which enhances the security of their accounts by only allowing requests to the account from secure connections. For example, when using REST APIs to access your storage account all non-HTTPS connections will be rejected.

“Secure transfer required” option is disabled by default. It also […]

506, 2018

Detect and prevent Petya ransomware in Azure Security Center

By |June 5th, 2018|Azure How To, IT Management, Microsoft Azure|0 Comments

Petya ransomware infection that originated in Ukraine affected a great deal of Windows machines worldwide and highlighted the sophisticated malware behavior in 64 countries. This article outlines basic measures that Azure users can take to detect and prevent this threat via Azure Security Center.

Prevention of the malware

Azure Security Center helps to prevent Petya ransomware in […]

1303, 2018

How to Use Sysmon to Detect In-Memory Attacks?

By |March 13th, 2018|Azure How To, Microsoft Azure|0 Comments

In-memory attacks have become a serious problem and the number of victims is increasing at a fast pace. Finding out the presence of the hacker in your system is difficult as hackers never write a file on the disk that is a usual way of hacking. They use in-memory instead which leaves little or no […]

1610, 2017

How Azure Security Center has Extended the Advanced Threat Protection to Hybrid Cloud Workloads?

By |October 16th, 2017|Azure News, Microsoft Azure, New Features|0 Comments

Azure Security Center provides cyber protection to the workloads of the users and now the services are extended to the workloads running on-premises and other clouds too. The complex infrastructure of the companies often leaves some security gaps in the systems which makes the system vulnerable to malicious items and attackers. Security Center unifies the […]

2107, 2017

How Web Application Firewall Protects your Azure Servers

By |July 21st, 2017|Azure News, Microsoft Azure|0 Comments

The IT professionals sometimes have no idea about the loopholes of the system they are working on. In order to exploit these loopholes, there are many tools in the market which can penetrate the system at any moment and ruin its credibility by disrupting its functionality. In order to bridge the gap between the security […]