Run Pipelines in Azure DevOps For Free
Azure Pipelines provides a quick, easy, and safe way to automate building your projects with consistent and quality code that’s readily available to users. Use Azure Pipelines to support the…
Learning, Sharing, Creating
Azure Pipelines provides a quick, easy, and safe way to automate building your projects with consistent and quality code that’s readily available to users. Use Azure Pipelines to support the…
IS-CAT Pro Dashboard allows users to view system compliance to the CIS Benchmarks over a period of time with dynamic reporting features. CIS-CAT Pro Dashboard displays CIS-CAT result scoring for…
Zero trust architectures are constructed on the basis that there is no secure perimeter. Instead, every event and connection is considered untrusted and potentially malicious. The goal of zero trust…
This guide shows you how to install a local instance of SonarQube and analyze a project. Installing a local instance gets you up and running quickly, so you can experience…
There are many free image hosting sites which you can upload your images then get URL to use it in your website or blog posts or social media sites. But…
BitLocker Drive Encryption In Intune is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately…
Using Azure Spot Virtual Machines allows you to take advantage of Microsoft Azure unused capacity at a significant cost savings. Spot VMs can be up to 90 percent cheaper than…
Microsoft Sentinel is a scalable, cloud-native solution that provides: Security information and event management (SIEM) Security orchestration, automation, and response (SOAR) Microsoft Sentinel delivers intelligent security analytics and threat intelligence…
Have you met this issue? You are in a production environment with Internet connection, but you are not able to pull the logs or captured packets out from a hardened…
The three main email security protocols complement one another, so implementing all trio of Authentication methods (SPF, DKIM and DMARC) will provde best security to your emails.
There are many different ways to install NextCloud and I had quite a few posts to show the installation. Recently I found this Github AIO (All in One) project and…
Sending a spoofed email is a very simple task to do and it is also can be easily blocked if your email service has been configured correctly. In this blog…