Column for Virtualizationreview.com – An Inside Look at Secure DevOps Kit for Microsoft Azure

My monthly column is now live over at virtualizationreview.com, this time I look at the Secure DevOps Kit for Microsoft Azure. A free download to automate the scanning of your Azure deployments for security issues.
Read it here.

Enjoy! And thanks for reading.

6 Lessons Learned During a Real-World Azure Migration for Virtualization Review.com

My monthly column is now live over at virtualizationreview.com, this time I cover an Azure migration for a real client of mine.

VMware to Azure IaaS with Azure Site Recovery, changing VM sizes, security etc. – it’s all covered. Read it here.

Enjoy! And thanks for reading.

Column for Virtualizationreview.com – A Look at Security in the Microsoft Cloud, Part 2: Azure Deployments

This is the final recently published article that I’m catching up on, this is the second column for virtualizationreview.com, covering security features that you can use in Azure. Read it here.

Enjoy! And thanks for reading.

Column for Virtualizationreview.com – A Look at Security in the Microsoft Cloud

I’m still catching up on recent articles that have been published, this post is an in-depth look at security in Microsoft 365, both the “normal” SKUs and the more expensive flavours, in my monthly column at virtualizationreview.com. Read it here.

It’s part one of a two parter, my next column covers security in Azure.

Enjoy! And thanks for reading.

FolderSecurityViewer for 4Sysops

The last of my recent posts for 4sysops is a review of FolderSecurityViewer (FSV) – a standalone utility that analyses and reports on NTFS permissions for local and remote file shares. It’s very powerful and if reporting on effective share permissions is a requirement you have, give FSV a go. Read the review here.

Enjoy! And thanks for reading.

Azure Confidential Computing for 4Sysops

I’m catching up on articles of mine that have been published over the last month. First up is a piece over at 4sysops on Azure Confidential Computing. This is really cool technology, using Intel Processors with enclaves where you can run code and decrypt data that no other process on the machine has access to. It’s early days but ACC is going to change how we do secure computing.

Read it here.

Enjoy! And thanks for reading.