Azure API Management: B2B Security
Azure API Management (APIM) is a cloud service that allows organizations to manage and secure APIs (Application Programming Interfaces). It provides features that enable organizations to securely...
View ArticleDeploy Kubernetes Cluster Using kOps on AWS Cloud
If you are familiar with Kubernetes, you must know Kubernetes installation is one of the challenging topics of Kubernetes. This challenge occurs because a multitude of installation methods exist....
View ArticleUsing Managed Identity Enabled Virtual Machines with Azure DevOps
What is Managed Identity? The password lifecycle can be tedious. Between securely storing, rotating regularly, and ensuring their complexity, they add a hefty burden to IT teams. In comes the use of...
View ArticleConfiguring Azure Databricks Cluster(s) Domain Name Resolution When...
When running production workloads that leverage enterprise services, like DNS, we expect these services to be reliable, available, and responsive. It is assumed that when a client requests an...
View ArticleHow to Automate Scheduled Tasks using Isolated-Mode Azure Functions
The cloud-oriented domain presents numerous styles of building automated solutions for various personal & business use cases. And there is no such thing as a correct or incorrect solution to these...
View ArticleHow to Generate a JWT Token using .NET 6
Why JWT Tokens? JSON Web Tokens (JWT) are an open, URL-safe & industry-standard method of representing claims securely between two parties. JWT Tokens are used for authorization and for exchanging...
View Article.NET Diagnostics in Kubernetes Deployments
Deploying containerized apps to production in Kubernetes with rigorous security practices requires minimizing what is installed on a container image and what can be done in a running container. But...
View Article4 Top of Mind Considerations for Microsoft 365 Admins
If someone asks me what the best and worst thing about SaaS software the answer is easy: it’s constantly changing. It’s great that we buy a subscription for service where customers and admins are...
View ArticleAIS Joins Forces with the U.S. Army PaYS Program
On June 14th, 2023, we held a signing ceremony to celebrate our official partnership with the PaYS program at our Headquarters in Reston, Virginia. What is PaYS? The Partnership for Your Success...
View ArticleFrom Trust Issues to Total Security: Embracing Zero Trust
If you’re in the IT or Security world, you’ve undoubtedly been bombarded with “Zero Trust” talk over the last few years. It’s become the pumpkin spice latte but for cybersecurity. Although Zero Trust...
View ArticleUpdating Components with the Power Platform Catalog
What is the Power Platform Catalog? Microsoft released the Power Platform Catalog on May 23, 2023, as a preview feature. It is a component and template library where Makers can submit their components...
View ArticleShifting Your Organization: The Twin Challenges of Transition and Complexity
Organizational change management has many definitions, and while it’s true that every change initiative is unique, we think they all have two common components, as this blog post describes....
View ArticlePower Platform: Microsoft Power Fx
Microsoft Power Fx is a general purpose, strong-typed, declarative, and functional programming language developed by Microsoft as part of the Power Platform. It is specifically designed for use in...
View ArticleClarity in Power Pages
Walk a mile in your user’s mouse clicks! Talking about optimizing user experience, Microsoft Clarity is a free behavioral analytics tool that turns user interactions into visual insights. Cookies come...
View ArticleMicrosoft Sentinel Playbooks for Beginners: Tips & Lessons
In cybersecurity, quick response to incidents is crucial. Security engineers protect data and handle potential threats, but manual tasks slow them down. Microsoft Sentinel Playbooks automate these...
View ArticleEnhancing Security: An Introduction to Machine Learning Notebooks in...
In the realm of cybersecurity, where threats are constantly evolving, finding efficient tools to automate security protection is essential. In this blog post, we will delve into our hands-on...
View ArticleModernizing Security Workflows with Sentinel Machine Learning (ML) Fusion...
In today’s advanced Artificial Intelligence (AI) world, as significant advancements and benefits are happening, data breaches and cyber threats have increased exponentially also. The need for strong...
View ArticleAzure OpenAI Security: Key Questions Addressed
As AI (Artificial Intelligence) and machine learning continue to make waves in various industries, security and data protection are among the top concerns for organizations. Some of the conversations...
View ArticleMicrosoft Fabric: The Unified Platform Revolutionizing Business Operations
In today’s data-driven world, there’s an increasing demand for unified platforms that bring together various tools to work cohesively. In response to this, Microsoft has developed Fabric, a unified...
View ArticleNavigating the Modernization Maze: A Tailored Solution for Insurers
In a world increasingly defined by digital agility and seamless customer experiences, insurance companies, be it in the realm of Property & Casualty (P&C) or Healthcare Payers, find themselves...
View Article