[5 Mins Docker] Create Your Own Image Hosting Site Using GitHub Project Picsur
There are many free image hosting sites which you can upload your images then get URL to use it in your website or blog posts or social media sites. But…
Learning, Sharing, Creating
There are many free image hosting sites which you can upload your images then get URL to use it in your website or blog posts or social media sites. But…
BitLocker Drive Encryption In Intune is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately…
Using Azure Spot Virtual Machines allows you to take advantage of Microsoft Azure unused capacity at a significant cost savings. Spot VMs can be up to 90 percent cheaper than…
Microsoft Sentinel is a scalable, cloud-native solution that provides: Security information and event management (SIEM) Security orchestration, automation, and response (SOAR) Microsoft Sentinel delivers intelligent security analytics and threat intelligence…
Have you met this issue? You are in a production environment with Internet connection, but you are not able to pull the logs or captured packets out from a hardened…
The three main email security protocols complement one another, so implementing all trio of Authentication methods (SPF, DKIM and DMARC) will provde best security to your emails.
There are many different ways to install NextCloud and I had quite a few posts to show the installation. Recently I found this Github AIO (All in One) project and…
Cloudflare Tunnel was previously named Warp during the beta phase. As Warp was added to the Argo product family, Cloudflare changed the name to Argo Tunnel to match. Once Cloudflare…
Sending a spoofed email is a very simple task to do and it is also can be easily blocked if your email service has been configured correctly. In this blog…
This post is to summarize the configuration of CyberArk Privilege cloud for Azure Active Directory environment.CyberArk Products Security Pillars (Access, Privilege, DevSecOps) 1. RBAC – Roles Based Access Control 2.…
The Qualys Cloud Platform and its integrated apps can simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum…
This topic has been haunted in my mind for quite a while. As an information security guy, we got tons of reports about end point activities. One of them is…