This post is about using either Network Rules or Application Rules in Azure Firewall for internal traffic. I’m going to discuss a common scenario, a “problem” […]
Recently I took and passed the SC-100 Exam, which, if you also hold the required prerequisites (SC-200, SC-300, or AZ-500), gains you Microsoft Certified Cybersecurity Architect. […]
[Azure Updates] Businesses have committed to the cloud for its scalability, agility, and security. As customers continue to deepen their investments in cloud and AI services […]
[Azure Updates] At Microsoft Azure, we are unwavering in our commitment to providing robust and reliable networking solutions for our customers. In today’s dynamic digital landscape, […]
This is part of my series on the Azure OpenAI Service: Azure OpenAI Service – Infra and Security Stuff Azure OpenAI Service – Authentication Azure OpenAI […]
This is part of my series on Azure Authorization. Azure Authorization – The Basics Azure Authorization – Azure RBAC Basics Azure Authorization – actions and notActions […]
This is part of my series on Azure Authorization. Azure Authorization – The Basics Azure Authorization – Azure RBAC Basics Azure Authorization – actions and notActions […]
Your resource hierarchy in Azure consists of resources, resource groups, subscriptions, management groups, and tenants. Root management group settings can impact all resources. It’s important Continue […]
Introduction Microsoft released into public preview in Q4 last year, workload identity federation service connections for Azure DevOps. This was very welcomed, as it greatly improves […]
Hello again! This post will be a continuation of my series on Azure authorization where I’ll be covering how actions and notActions (and dataActions and notDataActions) […]
Fragmented security stacks, excessive alerts, and understaffing are some of the biggest challenges security teams face today. However, you can overcome these obstacles with Copilot Continue […]