Celestina Odilitinatech.hashnode.dev·Dec 1, 2024Configure and Deploy Microsoft Sentinel as a Security Information and Event Management (SIEM) SolutionIntroduction In today’s digital landscape, protecting an organization’s IT infrastructure from evolving threats is more critical than ever. A robust Security Information and Event Management (SIEM) solution forms the backbone of modern cybersecurity ...1 likeMicrosoft Sentinel
Ryan Williamsora-wtf.com·Nov 30, 2024Enhance Oracle Cloud Security with Landing ZonesOracle Enterprise Landing Zones are frameworks within Oracle Cloud Infrastructure (OCI) designed to create secure and scalable cloud environments for enterprises. They include various versions such as OELZ v1, OELZ v1 Lite, OELZ v2, and CIS OCI Landi...oracle-cloud-security
Abhiramcloudbuddy.hashnode.dev·Nov 17, 2024Ensuring Compliance in a Shared Responsibility ModelIn today's cloud-first world, organizations are increasingly adopting cloud-based solutions to enhance their operations. However, this shift brings forth a unique challenge: shared responsibility for security. While cloud providers are responsible fo...cloud compliance
Leticia AkwueforThe Cloudville Blueprintscloudville.hashnode.dev·Nov 13, 2024What is VNet Integration?How Does VNet Integration Boosts Security and Connectivity for Your Web Apps? Azure VNet Integration might sound complicated, but it’s really just a powerful feature that helps make your web apps more secure, connected, and efficient! If you’re cur...Vnetintegration
Akanksha Girisecureshells.hashnode.dev·Nov 13, 2024Automating AWS Security Scans with Prowler, Fargate, and EventBridgeIntroduction Keeping your AWS environment secure can feel like a never-ending task. But with the right tools and automation, it doesn’t have to be overwhelming. In this blog, I’ll show you how to use AWS Fargate to run Prowler, a security scanner, on...clooud
Ikoh Sylvaikohsylva.hashnode.dev·Nov 11, 2024AWS Control Tower for Multi-Account SecurityAs organizations increasingly adopt cloud technologies, the complexity of managing multiple accounts becomes a significant challenge. AWS Control Tower emerges as a comprehensive solution that simplifies governance and enhances security across multip...12 likesCloud
Abhiramcloudbuddy.hashnode.dev·Oct 29, 2024Supply Chain Attacks: Securing Your Software from Third-Party CodeIn today's interconnected world, software applications increasingly rely on third-party components. While these components can accelerate development and provide valuable functionality, they also introduce new security risks. Supply chain attacks, wh...supplychainsecurity
Jayesh Nalawadejayeshdevops.hashnode.dev·Oct 28, 2024AWS Security Group vs NACLAWS Security Group vs NACL: What’s the Difference? When working with AWS infrastructure, controlling inbound and outbound traffic is essential for security. AWS provides two core components to manage this: Security Groups and Network Access Control L...AWSAWS
javed inamdarjavedtelsource.hashnode.dev·Oct 24, 2024Enhancing Security with Microsoft 365: Data Protection FeaturesIn today's rapidly evolving digital landscape, protecting sensitive data is paramount. Businesses are increasingly adopting cloud-based solutions to enhance collaboration and streamline operations, but this also introduces new risks related to data s...Microsoft
Subhanshu Mohan Guptablogs.subhanshumg.com·Oct 22, 2024Securing Kubernetes Operations with Runtime Security Best PracticesWelcome to the 9th installment of my Kubernetes series wherw we’ll dive into advanced runtime security techniques for Kubernetes environments to detect anomalies, enforce strict container security policies, and mitigate risks in production. Introduct...10 likes·32 readsMastering Kubernetes: Revolutionizing Cloud-Native OperationsKubernetes