Powered by Microsoft Azure
https://www.facebook.com/troubleshootingazure

Category: Security

azure, cybersecurity, IT

Vulnerability Management- Past, Present, and Future

Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities. It is a continuous process that should be embedded into an organization’s overall security program. Security teams need to have a clear understanding of what a vulnerability is and how it can impact their organization. A vulnerability is a flaw or weakness in…
Read more

The Internet of Things, VR and the Metaverse

Defining the Internet of Things, VR and the Metaverse We are in the midst of a technological revolution. The way we interact with the world is changing, and it’s happening faster than ever before. The Internet of Things (IoT), virtual reality (VR) and the metaverse are three technologies that are redefining our reality. The Internet…
Read more

The 5 biggest cyber attacks of the past decade

A cyber attack is any type of offensive action that targets computer networks or devices. Cyber attacks can be carried out by individuals, groups, or governments, and their motives can range from getting revenge to political or ideological gain. Some of the most common types of cyber attacks are denial-of-service attacks, malware infections, and phishing…
Read more

Azure Update Management Center (Preview)

Update management centre (preview) is a unified service to help manage and govern updates for all your machines. You can monitor Windows and Linux update compliance across your deployments in Azure, on-premises, and on the other cloud platforms from a single dashboard. Using the Update management centre (preview), you can make updates in real-time or…
Read more

Azure Application Security Group vs Network Security Group (ASG vs NSG)

Azure application security groups and Azure network security groups are both powerful tools used to protect your applications and resources in Azure. Both the vital for Azure Security and easy to configure. However, there are some critical differences between NSG and ASG that you should be aware of before deciding which one is right for…
Read more

Regulatory compliance using Defender for Cloud

The regulatory compliance dashboard in Microsoft Defender for Cloud shows your selected compliance standards with all their requirements, where supported requirements are mapped to applicable security assessments. The status of these assessments reflects your compliance with the standard. The regulatory compliance dashboard shows the status of all the assessments within your environment for your chosen…
Read more

Get Ahead of Infrastructure Chaos with IaC

Why IaC? Infrastructure as code is a way of managing and automating your company’s IT infrastructure using code. Code is written in a specific language that can be read and understood by computers, which helps automate tasks and ensure your infrastructure is always up to date. In the past, infrastructure has been managed using a…
Read more

Microsoft Sentinel: The beginner’s guide

Azure Sentinel is a cloud-based security information and event management (SIEM) solution that enables you to detect, investigate, and respond to threats in your Azure environment. Azure Sentinel is built on the Microsoft intelligence platform, which uses artificial intelligence (AI) and machine learning (ML) to help you find threats faster. Azure Sentinel integrates with other…
Read more

Microsoft’s Zero Trust Model: Summarised

Zero Trust Principles Verify explicitly Protect assets against attacker control by explicitly validating that all trust and security decisions use all relevant available information and telemetry. Use least privilege access Limit access to a potentially compromised asset with just-in-time and just-enough-access (JIT/JEA), and risk-based policies like adaptive access control. Assume breach Assume attackers can and…
Read more

Microsoft Cybersecurity Architect: Exam Review

SC-100 was released around the 1st week of July 2022 – candidates for this exam should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications.  Skills measured Design a Zero Trust strategy and architecture (30–35%) Evaluate Governance Risk…
Read more