Latest Blog Articles
9 MIN READ
There’s still life in the old dog yet: Even though many consider smart cards as obsolete, with MFA phishing becoming an increasing significant threat, this authentication method is experiencing a ren...
Feb 17, 202526Views
0likes
0Comments
Quickly deploy Azure Arc Enabled Data-Services on Openshift
Feb 14, 2025104Views
1like
0Comments
17 MIN READ
When Raven and I are out in my backyard, she's always on high alert, her keen senses picking up on every subtle change in her environment. Just like Raven, Microsoft Defender for Identity (MDI) is co...
Feb 12, 2025922Views
0likes
2Comments
This blog explores how to ingest AWS Security Hub findings into Microsoft Sentinel using native solutions. Although a GitHub reference for deploying an Azure Function-based solution is included, my e...
Feb 11, 2025290Views
0likes
1Comment
Overview:
The Defender for Servers plan in Microsoft Defender for Cloud reduces security risk and exposure for machines in your organization by providing actionable recommendations to improve and r...
Feb 11, 2025641Views
1like
0Comments
Introduction
One of the key challenges in managing cloud infrastructure with Azure DevOps is maintaining clear traceability between pipeline executions and modifications to Azure resources. Unlike ...
Feb 04, 2025460Views
1like
2Comments
Microsoft Entra ID provides robust tools for managing access to resources through Conditional Access (CA) policies. However, some service principals representing certain resources cannot be directly ...
Feb 04, 20251KViews
3likes
0Comments
This blog is in continuation to my previous blog on Demystifying Log Ingestion API where I discussed on ingesting custom log files to Microsoft Sentinel via Log Ingestion API approach. In this blog p...
Jan 28, 2025868Views
0likes
0Comments
Introduction
Hello everyone,
My name is Andrew Coughlin, and I am a Cloud Solutions Architect at Microsoft, specializing in Azure Infrastructure. In my role, I assist customers with utilizing Azu...
Jan 23, 2025228Views
0likes
0Comments
3 MIN READ
In today’s cybersecurity landscape, organizations face an ever-evolving set of threats targeting privileged accounts. These accounts often have elevated permissions, making them a high-value target f...
Jan 19, 20251.9KViews
3likes
2Comments
Resources
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand64 Topics
- MarkMorow59 Topics
- BrandonWilson52 Topics
- CarstenKinder50 Topics
- JenniferRoss41 Topics
- Noteworthy News40 Topics