Azure Cloud Security 3: You Are Logging Everything — And Seeing Almost Nothing

Blog You Are Logging Everything — And Seeing Almost Nothing This article is the third part in a series on cloud security, based on real Azure environments rather than idealized models. The first part emphasized establishing momentum through basic improvements.
Read more

Azure Cloud Security 2: Identity Is the Perimeter You Forgot to Guard

Azure Cloud Security 1: The First Security Conversation You Have Too Late: Hardening an Existing Azure Environment

Application Gateway for Containers: The Future of Cloud-Native Ingress

Shows different passkey options with an Apple laptop.

Spring Security 7 and Passkeys: A Practical Guide

The Unseen Work of a Cloud Architect: A Story About Building Azure the Hard (and Right) Way

How to Deploy AWS CloudFormation Templates Using Azure DevOps Pipelines

We clicked on the about‑jettro.pdf link and the input is prepared to parse the document.

A practical walkthrough for parsing PDFs and chatting about their content

A schematic overview of the Group Chat or Chaos pattern for a multi‑agent system

Implement the Agentic Chaos pattern

Using the AKS-MCP Server in Day-to-Day Operations

Azure Kubernetes Security Demystified: From Nodes to Pods

Header Rijswijk 2024

Spec‑driven development using Codex and Backlog.md

Jettro’s Devoxx 2025 Experience

Harnessing Chaos: Implementing Chaos Engineering with Azure Chaos Studio and Gremlin on AKS

René Janssen appointed new Managing Director at Luminis

Digital Sovereignty and the Public Cloud: Navigating Azure in a European Context

Building Agents with Embabel: A Hands‑On Introduction

New class of IT top talents from Luminis, Bosch and the Belastingdienst complete successful Accelerate trajectory in Aviodrome

Code quality: eerste hulp bij refactoring

Newsletter

Receive the latest news on
cloud & data innovations.

Want to know more about our cloud and data solutions?

We are your dedicated partner. Reach out to us.