Category: Compliance

(D)ata (L)oss (P)revention, content escapes your hands

Have no fear coz DLP is here and it won’t let your data to escape, at least if you made right configuration. It isn’t an automatic feature that you enable and forget. There a lot of different aspect you have…

Continue Reading (D)ata (L)oss (P)revention, content escapes your hands

(A)zure (I)nformation (P)rotection why and how?

Your organization has different kind of files. User personal files, patent pending studies, agreements, receipt, applications, copies of super duper secret documents scattered all over and you don’t even where. These a risk of leaking those documents externally either by…

Continue Reading (A)zure (I)nformation (P)rotection why and how?

Retention policies why and how?

The picture above is from one of the many CISSP videos that I have watched but it came to good point as I was planning to write a posts about data retention and why it matters. So why it matters?…

Continue Reading Retention policies why and how?

Office 365 ORCA and Configuration analyzer

I don’t how many of you ever used ORCA or Configuration analyzer? I have missed ORCA (Office 365 Advanced Threat Protection Recommended Configuration Analyzer) completely. I can see that it was introduced at Ignite 2019 but somehow I missed it….

Continue Reading Office 365 ORCA and Configuration analyzer

Azure Defender for container registries

Kubernetes clusters Continuous assessment of your clusters to provide visibility into misconfigurations and guidelines to help you mitigate identified threats. Learn more about environment hardening through security recommendations. Threat protection for clusters and Linux nodes. Alerts for suspicious activities are provided…

Continue Reading Azure Defender for container registries

Enterprise applications SSO with custom manifest configuration

Hi, Didn’t find an article about this, so I decided to gather the pieces and put them in one place. First little bit of background. You have Azure AD and  on-premises or cloud-based application that you want to allow SSO…

Continue Reading Enterprise applications SSO with custom manifest configuration

Using attack simulator for user education and gather insights.

This is part 2 of compliance and user governance. Here is part 1. Attack simulator is a tool for educating users and gathering insights on what they do wrong or right. Who can use it? If your organization has Microsoft…

Continue Reading Using attack simulator for user education and gather insights.

Why to use Compliance Manager for assessments and attack simulator to educate users.

Today I will be talking about Compliance Manager and in next part about Attack Simulator and why they matter for your organization. Compliance is based on organization industry or customer requirements. Compliance improves your security posture. It will help you…

Continue Reading Why to use Compliance Manager for assessments and attack simulator to educate users.