Detect Azure AD Hybrid Cloud Vulnerabilities

AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 – learn how to protect against their common vulnerabilities. Read More HERE…

Read more

Adding Guardrails To A Cloud Account After The Fact

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required? Read More HERE…

Read more

Terraform Tutorial: Drift Detection Strategies

A fundamental challenge of architecture built using tools like Terraform is configuration drift. Check out these actionable strategies and steps you can take to detect and mitigate Terraform drift and manage any drift issues you might face. Read More HERE…

Read more

IaC: Azure Resource Manager Templates vs. Terraform

Dive into a hands-on comparison of Azure Resource Manager templates and Terraform. This article highlights the primary features of each solution, comparing and contrasting their capabilities and performance. Read More HERE…

Read more

Microservice Security: How to Proactively Protect Apps

Microservices are growing in popularity—how can development teams embed seamless security into the entire pipeline? Fernando Cardoso, solutions architect at Trend Micro, breaks it down for you. Read More HERE…

Read more

Apache Log4j: Mitigation for DevOps

What can DevOps teams do to mitigate Apache Log4j risks? Explore how to secure your apps for today and against future vulnerabilities. Read More HERE…

Read more

Integrate Cybersecurity Incident Response in DevSecOps

This article examines the need for cross-functional integration and integrated communication between development and security teams to prevent communication dead zones and avoid delays in alerting and remediation. Read More HERE…

Read more

Overview: OWASP Top 10 2021

The long-awaited OWASP Top 10 2021 draft edition is here. We take you through the changes, new vulnerabilities, and the triggers, enabling you to secure your apps against the latest threats. Read More HERE…

Read more