Dominik KellerforLow-Code Software Engineeringfive.hashnode.dev·Sep 20, 2023Exploring AWS Security vs Azure Security: A Comprehensive Guide for 20231. Introduction Amazon Web Services (AWS) and Microsoft's Azure stand as two giants in the cloud computing realm. With a wide array of services ranging from data storage to machine learning, both have carved out significant market shares. While AWS a...DiscussAWS
Omkar Asgaonkaromkarasgaonkar.hashnode.dev·Aug 29, 2023CARTP - ReviewThe Certified Azure Red Team Professional (CARTP) by Altered Security is a beginner-friendly course for anyone who's looking to get started with Azure Security. The course lab simulates a multi-tenant environment that covers multiple kill chains (Att...DiscussReviewsAzure
Bervianto Leo Pratamahashnode.berviantoleo.my.id·May 4, 2023Why should we read Azure Security?During my last two weeks, I read the Azure Security MEAP version. The Azure Security book is authored by Bojan Magusic. From the Manning page, Bojan Magusic is a Program Manager with Microsoft on the Cloud Security Customer Experience Engineering Tea...Discuss·96 readsAzure
Joseph Mastertonjosephmasterton.hashnode.dev·Apr 8, 2023Conditional Access: Because Sometimes, Even Your Grandma Needs Extra SecurityLet's face it, we all love our grandmas. But when it comes to technology, they're not exactly the most security-savvy people. That's where Conditional Access comes in. It's like a protective bubble around your grandma's Azure Active Directory account...Discuss·36 readsAzure SecurityAzure
Joseph Mastertonjosephmasterton.hashnode.dev·Apr 8, 2023Azure PIMpin' Ain't EasyAzure Privileged Identity Management (PIM) is a cloud-based service that helps organizations manage, monitor, and control access to resources within Azure Active Directory (AD). It enables organizations to identify, manage, and protect their most cri...Discuss·91 readsAzure SecurityAzure
Syed Mansoor Hashmisyedhashmi.hashnode.dev·Aug 17, 2022Securing a Web Application in Azure Leveraging the Cisco NextGen Firewall.Securing a Web Application in Azure Leveraging the Cisco NextGen Firewall. In this blog we are going to learn how to secure the web application in Azure leveraging Cisco NextGen firewall and IDS/IPS. When you think about security in the cloud, alway...Discuss·283 readsAzure
Syed Mansoor Hashmisyedhashmi.hashnode.dev·Aug 7, 2022Security in the CloudWhen you think about security in the cloud, always consider the multi-layer approach. It defines the multiple layers of security controls in the cloud to ensure that if a security attack is not caught in one layer, it will most likely be caught in th...Discuss·164 readsAzure
Syed Mansoor Hashmisyedhashmi.hashnode.dev·Jul 16, 2022Set Up A Linux Based (OpenVPN) VPN ConcentratorSet Up A Linux Based (OpenVPN) VPN Concentrator In this blog I would to share how we install the VPN concentrator/gateway on linux server. In the cloud we used VPN. A VPN allows users secure access to a company's cloud resources, files, data or appli...Discuss·114 readsAzure