The Top 25 Most Dangerous Software Errors, often referred to as the CWE (Common Weakness Enumeration) Top 25, is a
Category: CyberSecurity

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
The certificates can be public and private Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates signed by a certificate authority
Cloud Adoption and Audit Planning
As organizations begin to transition services to the cloud, there is a need for ongoing assurances from both cloud customers
Digital Forensic & E-Discovery (Legal Hold) Types
Digital forensics, also known as computer and network forensics, has many definitions. It includes identification, collection, examination, and analysis of
FIDO – FIDO2: an open authentication standard
FIDO2 is an open authentication standard hosted by the FIDO Alliance that consists of the W3C Web Authentication specification (WebAuthn
Build next-generation security operations with Azure Sentinel
Azure Sentinel detects data incidents from connected sources, and then alerts you when action is necessary. You can use Azure
Who is responsible for What; Cloud security and Organisations Responsibility
Computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment
Demystifying Data loss prevention (DLP) Technologies
It becomes increasingly difficult and challenging to keep corporate confidential and sensitive information’s safe as more employees share files and
Demystifying Azure AD Identity and Access Managment (AAD IAM)
Azure AD identity and access management enable deep security, productivity, and management across devices, data, apps, and infrastructure. It’s an integral
Demystifying Microsoft Cyber Security Products ; Advanced Threat Analytics & Advanced Threat Protection; ATA/ATP
Cyber threats are emerging more frequently and prevalently and to protect your organisation from those threats Microsoft offers cyber security