97. Microsoft Azure Sentinel
97. Microsoft Azure Sentinel
Jelle and Gerben talk about Microsoft Azure Sentinel. They discuss how to set up monitoring and incident response, demonstrating how Sentinel can be used to centralize security data from Azure activity logs for better visibility and automated response. Key points include ingesting logs into a Log Analytics workspace, using content packs for data connectors and analytics rules, and scanning data at the subscription or resource group level. They also show how logs can be analyzed for potential threats using queries and custom alerts. Their discussion emphasizes starting small, continuously improving rules and workbooks over time based on detected signals, and considering red team testing to evaluate detection capabilities.
Links for more information:
More videos
-
128. How to Benchmark your .NET code
In this Betatalks episode, Christian and Jelle show how BenchmarkDotNet measures .NET performance, comparing string concatenation with StringBuilder to spot regressions.Content typeVideo
-
127. AI and RAG Scenarios Using Just SQL Server 2025
Christian and Jelle explore SQL Server 2025 AI features, showing embeddings, vector search, and semantic queries to build RAG style solutions directly in SQL.
Content typeVideo
-
126. Impact of the NIS2 Directive on Software Developers
Jelle and Christian discuss how NIS2 imposes stricter security requirements on software teams and why early preparation for 2026 is essential.Content typeVideo
Stay up to date with our Betatalks and tech updates!
Sign up and receive a biweekly update with the latest knowledge and developments.