Recent Blog ArticlesMost RecentMost LikesProtecting Containers: A Primer for Moving from an EDR-based Threat Approach Many Security teams are familiar with an EDR-based approach to security. However, container protection within their cloud ecosystem can seem much more challenging and complex. Protecting conta...Future Proof your SOC with the Power of the Azure Ecosystem and Defender Threat Intelligence In this blog post, we’ll look at a step-by-step tutorial, using the power of Azure Data Explorer (which can act as a security data repository), to bring key data into Sentinel for Analytics, H...Your Ultimate Solution for Catching Container Image Exposure Before It Happens Leveraging Microsoft Defender for Cloud Security Posture Management (DCSPM) for proactively securing container images Simple Row-Based Access Workbook: Lab Walk-Through with Azure Sentinel and Azure Data Explorer (ADX) Different user = Different Views? Have you ever wanted to manage granular permissions based on row-level values in a database? It's easy with Sentinel and Azure Data Explorer!