Alex K.

Blog author

Posts in 2025

Microsoft Entra essential configuration (security settings you can't afford to miss)

Microsoft Entra (formerly Azure Entra ID/Azure Active Directory) is the backbone of modern enterprise identity management, but a misconfigured tenant is a hacker's dream. After analyzing countless security incidents and Microsoft's latest 2025 updates, I've compiled the essential configurations that separate secure organizations from tomorrow's breach headlines.
Security Azure Entra Copilot

2025 Big Data & Analytics summit in Toronto

2025 Big Data & Analytics Summit in Toronto review, covering key insights from AI sessions, networking experiences, and vendor interactions. The post highlights practical takeaways on data strategy implementation and infrastructure building, while providing recommendations for future attendees considering in-person versus online participation.
Big Data AI DataOps

I'm Back! Introducing the New Strive2Code Blog Architecture

Hey everyone, it's been a while! Some of you might have noticed that I haven't published any new blog posts or videos lately. There's a good reason for that - I've been heads-down rebuilding Strive2Code from the ground up! For the past few weeks, I've been pouring my nights and weekends into completely revamping my blogging platform. After many years with BlogEngine.NET (which relies on the .NET
.NET Azure DevOps Architecture

You've been tracked. Scan your phone now!

Have you ever wondered if your phone is secretly being tracked? With so many spyware threats out there, it's crucial to stay ahead. In this video, I'll show you how to use MVT – Mobile Verification Toolkit – to scan your phone for spyware, analyze results, and secure your device. Whether you're an iPhone or Android user, this tool can reveal hidden threats that traditional antivirus apps miss.
iOS Android MVT Security

Microsoft Security Intro

In today’s world, where cyber threats evolve faster than ever, securing your digital infrastructure isn’t just an option—it’s a necessity. That’s why I’ve created an in-depth YouTube video that explores the power of Microsoft 365 and Azure Security tools to help businesses of all sizes protect what matters most. If you haven’t watched it yet, here’s what you’re missing out on!
Security Microsoft 365 Azure

How to protect yourself from Phishing and Ransomware

Phishing attacks are one of the most common entry points for ransomware. A single click on a malicious link or attachment can open the floodgates to attackers, compromising sensitive data and putting systems at risk. Whether you're a home user relying on Microsoft Defender or an office user with Microsoft 365 licenses, understanding and implementing the right security measures can save you from
Microsoft 365 Microsoft Defender Windows