News

Microsoft Azure offers a suite of cloud computing services with a competitive pay-as-you-go pricing model. Some services can even be used for free.
Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain ...
Microsoft today announced a significant extension of its global datacentre footprint to Western Australia (WA) to help meet the growing demand for cloud and AI services across the state and support ...
You can use the Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples demonstrate the building of queries that you can modify for your specific needs.
A vulnerability in Azure Kubernetes Services allowed attackers to escalate privileges and access sensitive information on the clusters.
"This account has minimal Kubernetes permissions in recently deployed Azure Kubernetes Service (AKS) clusters, but it can notably list nodes in the cluster." TLS_BOOTSTRAP_TOKEN, on the other hand, ...
This blog is a summary of how overall observability (metrics, alerting, and log aggregation) will work in Azure Kubernetes Service (AKS) for any modern containerized application.
Microsoft continues to evolve its Azure Kubernetes Service. Kubernetes co-creator Brendan Burns tells us where it’s going next.
Securing Kubernetes from the Linux kernel Falco is designed to work in any Kubernetes cluster including Azure Kubernetes Service and deliver events to your existing security tools.