Securing Terraform State in Azure Blob Storage using Best Practices
When your team loses control of its Terraform state file, it loses control of everything in the subscription. An unencrypted or publicly exposed .tfstate isn’t…
Explore articles on Security.
19 articles
When your team loses control of its Terraform state file, it loses control of everything in the subscription. An unencrypted or publicly exposed .tfstate isn’t…
Securing network environments in Microsoft Azure is paramount when organizations migrate their infrastructure and applications to the cloud. Azure, as one of the leading cloud…
A hub-and-spoke network topology is a popular design pattern used to manage and control network traffic when deploying enterprise workloads to Microsoft Azure. This article…
In the current cloud landscape, security has never been more important than it is today. This applies to Remote Desktop Protocol (RDP) security as it…
The era of passwords is coming to an end. In December 2024, Microsoft stated they are blocking 7,000 attacks on passwords per second. A number…
The recent CrowdStrike bug that took out 1% of Windows machines (approx. 8.5 million PCs) globally, the question of why Antivirus apps use Kernel Mode…
A set of ‘critical’ zero-day vulnerabilities, collectively named IngressNightmare, have been discovered in the widely used Ingress-NGINX Controller for Kubernetes that can result in a…
On July 18, 2024, CrowdStrike released a update with a bug that significantly impacted Windows machines globally, including virtual machines (VMs) running on multiple cloud…
The Microsoft Azure Security Technologies (AZ-500) certification exam tests and validates a candidates expertise at implementing security controls, and maintaining security, and identity, access and…
Are you looking at security certifications? Certification in the areas of Cybersecurity, IT Security, and Computer Security do not have as many straight forward options…
CrowdStrike, in an effort to mitigate the widespread disruption caused by the recent CrowdStrike content bug, they have launched a comprehensive “Remediation and Guidance Hub.”…
In a world where cyber threats are evolving faster than ever, the need for robust, proactive, and future-focused security measures has never been greater. Enter…
In today’s digital landscape, web application security is paramount. As businesses increasingly migrate their operations to the cloud, the importance of safeguarding web applications hosted…
Enterprises are increasingly adopting multicloud strategies—leveraging a mix of cloud service providers such as Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP)—to…
There’s a lot of buzz about the “Cloud” as a result of the rapid growth and adoption of cloud-based services like Microsoft Azure of the…
With Cybersecurity an extremely important aspect, and ever so increasing in importance, of any organization and their computer infrastructure and software solutions, Microsoft has introduced…
Microsoft has released a recovery tool designed to aid IT administrators in fixing Windows machines affected by the recent CrowdStrike Falcon agent issue. This problem…
In today’s rapidly evolving digital landscape, enterprises face a constant barrage of cybersecurity threats. As organizations increasingly turn to cutting-edge technologies like Generative Artificial Intelligence…
The world of cybersecurity faced a catastrophic event recently when a CrowdStrike bug led to the crashing of 8.5 million PCs, approximately 1% of all…