Context: After applying Sensitive Data Encapsulation, all sensitive data is gathered in a known place in the database. This makes it possible to apply further protection best practices.
Pro… Read More
Context: Protected data needs to be used. There are many types of entities which might attempt to use the data.
Problem: If no standard way of accessing data exists, then each entity might… Read More
Below is a list of updates, recommendations and new technologies for customers moving SAP applications onto Azure.
At the end of the blog is a checklist we recommend all customers follow wit… Read More
The first thing I am going to do is setup a standard way to work with and store the solutions primary secrets and cryptographic materials. I find that as a developer I am called on to decide… Read More
Microsoft Azure Media Services enables you to deliver Http-Live-Streaming (HLS) and Smooth Streams encrypted with AES128 (Advanced Encryption Standard using 128-bit encryption keys). To… Read More
Previously I have taken the steps to add secrets and keys to the Key Vault as well as create my self signed certificates using PowerShell. With the opportunities to use drive encryption in A… Read More
VM disk encryption is achieved using Bitlocker encryption of Windows VMs and DMcrypt in Linux VMs. It leverages Azure KeyVault services to store your encryption keys which is again an a… Read More
Azure Key Vault needs no introduction, it’s already adapted by Azure developers to safeguard keys and secrets used by cloud applications and services.
– it used to encrypt keys… Read More
Here are steps to write NLog to Database in Azure Functions
1. via Config (NLog.config)
xml version=“1.0“ encoding=“utf-8“ ?>
nlog xmlns=“http://www.nlog-p… Read More
Application Development Manager, Jason Venema, takes a plunge into Azure Data Lake, Microsoft’s hyperscale repository for big data analytic workloads in the cloud. Data Lake make… Read More
Azure Data Factory allows data to move from a multitude of sources to a multitude of destinations. A common usage case is to take on premise data and place it into a cloud database such as A… Read More
The National Association of Realtors has announced its chosen seven new technology startups for its 2017 REach tech accelerator program. The aim of the program is to provide promising real e… Read More
Hi all, we are delighted to share the Production Ready Release of the Microsoft ODBC Driver 13.1 for macOS – El Capitan and Sierra. The new driver enables access to SQL Serve… Read More
In this article, I would like to demonstrate how to deploy an ASP.NET Core application with SQL Server dependency to nano server by docker. To support .NET Core in docker, Microsoft has publ… Read More
We’re now at version 15.36 for this week’s update. Here’s a look at the top fixes and known issues:
Top bug fixes and improvements:
Google accounts: Non-supported folder a… Read More
With the world quickly moving into the second half of 2016, our thoughts are starting to drift towards the next set of emerging web design trends in 2017.
The last few years have seen a… Read More
In my old post I described the fundamentals of Power BI Embedded which enables ISV developers to integrate Power BI report in their applications.
Power BI Embedded is one of the Azure servic… Read More
The purpose of writing this blog is to explain the difference in behavior when you assess a database and migrate a database using DMA
With the assessment option you can select an On-Premise… Read More
At //BUILD 2017, we shipped an update to the Continuous Delivery Tools for Visual Studio. This update has support for configuring a Continuous Integration and Continuous Delivery pipeline fo… Read More
There have been a number of recent high profile data exposures related to storage of data within cloud services. Often times data isn't properly secured in these services, leaving sensitive… Read More
This post is a step by step walkthrough of using the Azure Media Services Explorer (http://aka.ms/amse) to apply AES encryption to a video asset. I’ll describe the full process o… Read More
This post is provided by Senior App Dev Manager, Chris Tjoumas who provides an overview of Always Encrypted with SQL Server 2016.Introduction
In this post, I want to focus on the Always Encr… Read More
This blog is part 2 of a series that covers relevant Azure fundamentals - concepts/terminology you need to know, in the context of Hadoop. Much off the content is a copy of Azure docum… Read More
WORK IN PROGRESS
This blog is part 3 of a series that covers relevant Azure fundamentals - concepts/terminology that you need to know, in the context of Hadoop. Much off the content… Read More
This blog is part 4 of a series that covers relevant Azure fundamentals - concepts/terminology you need to know, in the context of Hadoop. While the first three touched on Azure infras… Read More
Today we all give the internet for granted. That is not surprising, considering that over 3.5bln people are connected. Also, that number grows each second, faster and faster. Almost like a r… Read More
Olá Pessoal tudo bem? Espero que sim!
Recentemente a Microsoft anunciou o Public Preview do Azure Database Migration Service (Azure DMS), uma nova forma de levar seus dados em… Read More
I am very excited to report that I have just deployed an isolated App Service Environment (ASE) in Azure Government. Here are a few quick pointers on how to get started.
Azure App Service En… Read More
Azure Functions is a platform for deploying serverless functions in a variety of different languages. It is easy to create APIs without having to worry about the underlying architecture and… Read More
Recently, I have across a scenario where the requirement is to fetch token from "IssuedToken*" active ADFS endpoints. Once application has the token from "IssuedToken*" endpoint, it would ha… Read More
I recently took the 70-533, Implementing Microsoft Azure Infrastructure Solutions exam. Each Microsoft exam page has a Skills Measured section. This section clearly outlines the knowledge th… Read More
Create a Jenkins server on an Azure Linux VM from the Azure portal has introduced how to configure a standalone Jenkins VM in azure based on Azure Marketplace image for Jenkins. This image i… Read More
In a previous blog post, I discussed that it is easy to set up a Kubernetes cluster in Azure Government (or Commercial) and deploy web applications to the cluster. The example deployment lag… Read More
Using SSL certificates with LetsEncrypt
On the following post we are going to explain how quickly and easy is to assign an SSL certificate to your Azure WebApp I have a WordPress WebApp alre… Read More
This is second part of the series on deploying Elasticsearch, Logstash and Kibana (ELK) to Azure Kubernetes Service cluster. In this article I am going to share steps needed to enable Azure… Read More
How to create a native app registration
This guide assumes that you already own an Azure Subscription, an Azure Active Directory properly setup and your PowerShell environment properly set f… Read More
If you haven't read part 1, you should do so before continuing here. Part 1 contains all the prerequisites you need in order to continue with this post.
Create your organization and your fir… Read More
Ever heard of a Virtual Private Network or VPN? If not, a VPN is a service that allows you to surf the internet privately, keeping you anonymous from the radar of online hackers. VPNs have i… Read More
Today, we are announcing .NET Core 3 Preview 1. It is the first public release of .NET Core 3. We have some exciting new features to share and would love your feedback. You can develop .NET… Read More
Though iPhone 6s is not a big upgrade over its predecessor, still it is an enticingly superb iPhone. It is considerably more powerful than previous models. Plus, the 3D Touch option is one o… Read More
Our sixth AI reference architecture (on the Azure Architecture Center) comes from AzureCAT Mike Wasson.
Distributed training of deep learning models on Azure
Reference architectur… Read More
BitDefender is known as one of the most user-friendly and one of the best anti-virus in the market. One can trust BitDefender especially because of its multi-layer performance that makes it… Read More
Credit card processing might not seem complicated, but small businesses, like home-based sellers and one-person operations, have a lot to contemplate when they accept card payments. The way… Read More
This post is divided into two main parts: How to read a product review that helps you make safe purchases online and how to stay safe when paying online. There’s even a bonus section w… Read More
We all know about cryptocurrencies and the attention around has increased due to Facebook’s involvement with it. Due to such attention, many people are looking forward to being potent… Read More
An operating system and any application software can easily be reinstalled any time, but the unique thing in the system is your important data. The user always created exclusive data in thei… Read More
BleepingComputer has released a report according to which a malware asking for a Bitcoin ransom is being circulated.
Not just scary, empty messages but can actually permanently encrypt file… Read More
Being targeted by cybercriminals might seem like something that happens to only big companies. But, if the 2018 report by Verizon Data Breach Investigation is anything to go by, you should b… Read More
Suppose you need to encrypt data between two peer-to-peer devices over an untrusted medium (i.e. the Internet), and you have an authenticated low-bandwidth channel that can be used to send a… Read More
Who better to learn about digital signatures from? Art by Kyume
Let’s talk about digital signature algorithms.
Digital signature algorithms are one of the coolest ideas to come o… Read More
If you’re reading this wondering if you should stop using AES-GCM in some standard protocol (TLS 1.3), the short answer is “No, you’re fine”.
I specialize in secur… Read More
VPNs are a Windows user’s best friend, but what exactly can you do with them?That’s what we’re going to discuss in this quick article. If you’d also like to find the… Read More
There are a lot of random topics I’ve wanted to write about since I started Dhole Moments, and for one reason or another, haven’t actually written about. I know from past experie… Read More
There seems to be a lot of interest among software developers in the various cryptographic building blocks (block ciphers, hash functions, etc.), and more specifically how they stack up agai… Read More
Earlier this week, NIST announced Round 3 of the Post-Quantum Cryptography project and published their rationale for selecting from the Round 2 candidates.
NIST did something clever this… Read More