Cloud Security BytesWearable SecurityTechnology has advanced significantly in the past few years, including the development of wearable devices which are computing…Apr 9, 2023Apr 9, 2023
Cloud Security BytesAZURE AD CONSENT AND APPLICATION REGISTRATION SECURITY REVIEWThis document encompasses the security review requirements and due diligence, the security analysts will have to practice while handling…Apr 7, 2023Apr 7, 2023
Cloud Security BytesCurated list of Azure AD Error codes useful for huntingSome of the important Azure AD error does for hunting.Jul 22, 2022Jul 22, 2022
Cloud Security BytesAzure Security posture management using Azure security Center polices.We all know assigning Azure policies are one of the best ways to have cloud governance and a lot of organizations use the built in Azure…Aug 6, 2021Aug 6, 2021
Cloud Security BytesAzure Defender ( AzD) and Microsoft Defender for Endpoint (MDE)This article is to discuss about Azure Defender and Microsoft Defender for Endpoint. Focus is give more on their EDR capabilities.Jun 7, 2021Jun 7, 2021
Cloud Security BytesAzure AD App registration & Enterprise applicationsAzure AD App registration ? Enterprise apps ? Admin consent ? User delegation access? Application delegation ?May 31, 2021May 31, 2021
Cloud Security BytesAzure Managed Identity vs Service principalIn this short article, I wanted to put some light across the confusing concepts in Azure AD around Service Principals and Managed…May 30, 2021May 30, 2021