Test and evaluate your WAF before hackers

Test and evaluate your WAF before hackers

Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most common application security technologies available on the market. Since the last century, WAFs have evolved by ...
Browserless Entra Device Code Flow

Browserless Entra Device Code Flow

Zugspitze, Bavaria, Germany. Photo by Andrew ChilesDid you know that it is possible to perform every step in Entra’s OAuth 2.0 Device Code flow — including the user authentication steps — without a browser?Why that matters:Automating authentication flows enables ...
CaC audits, compliance, compliance requirements GDPR

5 Security Benefits of Configuration as Code (CaC)

CaC can help organizations maintain a secure state across infrastructure, detect and respond to incidents more quickly and maintain compliance ...
Security Boulevard
Does moving to the cloud mean compromising on security?

Does moving to the cloud mean compromising on security?

Cloud security means multiple teams with a shared responsibility. The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations ...
The Most Dangerous Entra Role You’ve (Probably) Never Heard Of

The Most Dangerous Entra Role You’ve (Probably) Never Heard Of

Entra ID has a built-in role called “Partner Tier2 Support” that enables escalation to Global Admin, but this role is hidden from view in the Azure portal GUI.Why it mattersAn adversary may target the ...
Microsoft Breach — What Happened? What Should Azure Admins Do?

Microsoft Breach — What Happened? What Should Azure Admins Do?

Microsoft Breach — What Happened? What Should Azure Admins Do?On January 25, 2024, Microsoft published a blog post that detailed their recent breach at the hands of “Midnight Blizzard”. In this blog post, I will ...

The Vendor of My Cloud-Vendor is My Friend

What does a suburban roofing company have in common with a cloud supplier? The answer can be found in the passage of time. This conversation occurred with Sean Heide, research technical director ...
Temenos Banking Ecosystem now Enhanced with Data-Centric Security

Temenos Banking Ecosystem now Enhanced with Data-Centric Security

Vast quantities of customer data flow into banks every day and leveraging this data is key to securing growth in the modern banking landscape. The challenge that banks and other financial services ...
What Is Cloud Computing? Services, Types, Advantages and Use Cases

What Is Cloud Computing? Services, Types, Advantages and Use Cases

As the digital horizon expands, businesses worldwide are embracing the cloud, recognizing its transformative capabilities in orchestrating efficiency, progress andRead More The post What Is Cloud Computing? Services, Types, Advantages and Use ...
What Is Cloud Computing? Services, Types, Advantages and Use Cases

What Is Cloud Computing? Services, Types, Advantages and Use Cases

As the digital horizon expands, businesses worldwide are embracing the cloud, recognizing its transformative capabilities in orchestrating efficiency, progress andRead More The post What Is Cloud Computing? Services, Types, Advantages and Use ...