Category: Security

The Top Cloud Security Concerns for Cyber Security Professionals
The Top Cloud Security Concerns for Cyber Security Professionals
Blog Posts

Today’s security teams have a lot on their minds. Cloud implementations have brought incredible leveraging of on-demand services to modern enterprise – but they’ve also introduced a host of new security issues. Let’s look at some of what is on the radar for professionals tasked with managing these innovative cloud services and partnerships with tech… READ MORE

Demystifying Azure (un)security
Demystifying Azure (un)security
Webinars

One of the reasons why some companies are still reluctant to accept the Cloud is the thinking that data and infrastructure are more secure on-premises, between four walls, “on the ground”. Learn more with Mustafa why this may not be true…

What is the Difference Between DirectAccess and Always On VPN?
What is the Difference Between DirectAccess and Always On VPN?
Blog Posts

DirectAccess has been around for many years, and with Microsoft now moving in the direction of Always On VPN, I’m often asked “What’s the difference between DirectAccess and Always On VPN?” Fundamentally they both provide seamless and transparent, always on remote access. However, Always On VPN has a number of advantages over DirectAccess in terms of security,… READ MORE

Talking to your Security Team about PowerShell and dbatools
Talking to your Security Team about PowerShell and dbatools
Blog Posts

Last year, during our PASS Summit and SQL Bits precons, we highlighted the reasons that PowerShell is even more secure than GUI administration. I even created a cute lil logo for it 😁 Recently, our team had a discussion about security in #dbatools-dev and I realized I should probably highlight why PowerShell and dbatools are ideal for every organization, including security-minded organizations. If you’re… READ MORE

A way to deal with HTTP error responses
A way to deal with HTTP error responses
Blog Posts

When I read Ken’s blog post about an issue he had with a certain class in a project he is working on, his solution didn’t sit quite right with me. I know that in Ken’s case, the code couldn’t be improved any further because of dependencies on other bits. Nothing can stop us however from having a… READ MORE

Attacks of the Industry: A View to the Future of Cybersecurity
Attacks of the Industry: A View to the Future of Cybersecurity
Blog Posts

Check out Luise Freese’s sketch note from Paula Januszkiewicz’s keynote:  Attacks of the Industry: A View to the Future of Cybersecurity About Paula: Paula Januszkiewicz is a CEO and Founder of CQURE Inc. and CQURE Academy. She is an IT Security Auditor and Penetration Tester, Cloud and Datacenter Management MVP and trainer (MCT), and Microsoft… READ MORE

Part 1 - How Secure is your Office 365 Ecosystem?
Part 1 – How Secure is your Office 365 Ecosystem?
Blog Posts

  So, today’s blog post is going to be focused on the Security and Compliance features in Office 365 so that you folks can understand how secure your Office 365 ecosystem is. It’s a known fact that organizations across the globe are embracing Digital transformation to meet the growing needs and deeds of today’s Cloud… READ MORE

Azure Advanced Threat Protection Lateral Movement
Azure Advanced Threat Protection Lateral Movement
Blog Posts

In this blog post, I will be talking about Azure advanced threat protection lateral movement capability, and how this can extremely help you get a unique perspective on how attackers can move across your network and elevate their access once they compromise one your sensitive accounts. Furthermore, Azure ATP and Windows Defender ATP integration gives you the full picture… READ MORE