Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:

Category: Security

https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-prerequisites

How to Configure Azure Advance Threat Protection – ATP

October 19, 2018 Babar Zia Azure, Security, tech, tips, windows Leave a comment

Azure ATP monitors your domain controllers by capturing and parsing network traffic and leveraging Windows events directly from your domain

Continue reading

Moving Migrating from DirSync or FIM to Azure Active Directory Connect sync

October 18, 2018 Babar Zia AD, ADFS, Azure, Cloud, Office365, Security, SERVER Leave a comment

Azure AD Connect sync is the successor of DirSync, Azure AD Sync, and Forefront Identity Manager with the Azure Active

Continue reading

Top Ten Security Threats to Web Applications

October 16, 2018 Babar Zia Security Leave a comment

The Open Web Application Security Project (OWASP) has provided the 10 most critical web application security threats that should serve

Continue reading

Server and System Hardening / Securing

October 18, 2014 Baz networking, Security, tech, tips Leave a comment

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing

Continue reading

Domain Name System DNS Basics

September 23, 2014 Baz networking, Security, tech Leave a comment

Domains are managed by using a worldwide system of domain registrars and databases. The Domain Name System DNS are the

Continue reading

The OSI Model

September 22, 2014 Baz networking, Security, tech Leave a comment

The OSI model consolidates network communications into seven simplified layers. So what are the seven layers? Below, I list them

Continue reading

HP Switch Port Security Configuration CLI

September 16, 2014 Baz HP, networking, Security, tech, tips Leave a comment

I hope we all know how to login to Switch by telnet or putty etc. After successful logon Type Config

Continue reading

Software Restriction Policies for individual pc’s or domain

October 29, 2013 Baz networking, Security, tech, tips, windows Leave a comment

We can protect windows system by creating software restriction policy so virus /spyware or any illegitimate program/application cant be installed. 

Continue reading

Posts pagination

«Previous Posts 1 2

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

The Cyber Security, Compliance & Cloud

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types
  • FIDO – FIDO2: an open authentication standard
WordPress Theme: Tortuga by ThemeZee.