Securing Terraform State in Azure Blob Storage using Best Practices
When your team loses control of its Terraform state file, it loses control of everything in the subscription. An unencrypted or publicly exposed .tfstate isn’t…
Explore articles on Security.
19 articles
When your team loses control of its Terraform state file, it loses control of everything in the subscription. An unencrypted or publicly exposed .tfstate isn’t…
A set of ‘critical’ zero-day vulnerabilities, collectively named IngressNightmare, have been discovered in the widely used Ingress-NGINX Controller for Kubernetes that can result in a…
The era of passwords is coming to an end. In December 2024, Microsoft stated they are blocking 7,000 attacks on passwords per second. A number…
In a world where cyber threats are evolving faster than ever, the need for robust, proactive, and future-focused security measures has never been greater. Enter…
Enterprises are increasingly adopting multicloud strategies—leveraging a mix of cloud service providers such as Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP)—to…
Securing network environments in Microsoft Azure is paramount when organizations migrate their infrastructure and applications to the cloud. Azure, as one of the leading cloud…
CrowdStrike, in an effort to mitigate the widespread disruption caused by the recent CrowdStrike content bug, they have launched a comprehensive “Remediation and Guidance Hub.”…
Microsoft has released a recovery tool designed to aid IT administrators in fixing Windows machines affected by the recent CrowdStrike Falcon agent issue. This problem…
The world of cybersecurity faced a catastrophic event recently when a CrowdStrike bug led to the crashing of 8.5 million PCs, approximately 1% of all…
The recent CrowdStrike bug that took out 1% of Windows machines (approx. 8.5 million PCs) globally, the question of why Antivirus apps use Kernel Mode…
On July 18, 2024, CrowdStrike released a update with a bug that significantly impacted Windows machines globally, including virtual machines (VMs) running on multiple cloud…
In today’s rapidly evolving digital landscape, enterprises face a constant barrage of cybersecurity threats. As organizations increasingly turn to cutting-edge technologies like Generative Artificial Intelligence…
A hub-and-spoke network topology is a popular design pattern used to manage and control network traffic when deploying enterprise workloads to Microsoft Azure. This article…
In today’s digital landscape, web application security is paramount. As businesses increasingly migrate their operations to the cloud, the importance of safeguarding web applications hosted…
The Microsoft Azure Security Technologies (AZ-500) certification exam tests and validates a candidates expertise at implementing security controls, and maintaining security, and identity, access and…
With Cybersecurity an extremely important aspect, and ever so increasing in importance, of any organization and their computer infrastructure and software solutions, Microsoft has introduced…
Are you looking at security certifications? Certification in the areas of Cybersecurity, IT Security, and Computer Security do not have as many straight forward options…
In the current cloud landscape, security has never been more important than it is today. This applies to Remote Desktop Protocol (RDP) security as it…
There’s a lot of buzz about the “Cloud” as a result of the rapid growth and adoption of cloud-based services like Microsoft Azure of the…