Azure Cloud Security 3: You Are Logging Everything — And Seeing Almost Nothing

Blog You Are Logging Everything — And Seeing Almost Nothing This article is the third part in a series on cloud security, based on real Azure environments rather than idealized models. The first part emphasized establishing momentum through basic improvements.
Read more

Azure Cloud Security 2: Identity Is the Perimeter You Forgot to Guard

Azure Cloud Security 1: The First Security Conversation You Have Too Late: Hardening an Existing Azure Environment

Shows different passkey options with an Apple laptop.

Spring Security 7 and Passkeys: A Practical Guide

How to Deploy AWS CloudFormation Templates Using Azure DevOps Pipelines

We clicked on the about‑jettro.pdf link and the input is prepared to parse the document.

A practical walkthrough for parsing PDFs and chatting about their content

A schematic overview of the Group Chat or Chaos pattern for a multi‑agent system

Implement the Agentic Chaos pattern

Using the AKS-MCP Server in Day-to-Day Operations

Azure Kubernetes Security Demystified: From Nodes to Pods

Header Rijswijk 2024

Spec‑driven development using Codex and Backlog.md

Jettro’s Devoxx 2025 Experience

Hoe bereid je jouw website voor op de European Accessibility Act?

Harnessing Chaos: Implementing Chaos Engineering with Azure Chaos Studio and Gremlin on AKS

René Janssen Nieuwe Managing Director Luminis

Digital Sovereignty and the Public Cloud: Navigating Azure in a European Context

Building Agents with Embabel: A Hands‑On Introduction

Nieuwe lichting IT-toptalenten van Luminis, Bosch en de Belastingdienst ronden succesvol Accelerate-traject af in Aviodrome

Code quality: eerste hulp bij refactoring

Luminis en VanDijk: al 15 jaar samen bouwen aan educatieve dienstverlening

Nieuwsbrief

Ontvang nieuws over
cloud & data innovaties.

Meer weten over onze cloud en data oplossingen?

Wij staan voor je klaar. Stuur ons een bericht.