🔐Security
Cyber security is a collection of strategies, technologies, and procedures designed to secure the confidentiality, integrity, and availability of computer systems, networks, and data against cyber-attacks or unauthorized access.
Microsoft Secure Future Initiative: Building a safer digital ecosystem Paid Members Public
Microsoft’s Secure Future Initiative (SFI) is more than a response to cyber threats it’s a blueprint for businesses to secure their digital ecosystems. In just one year, SFI has embedded security into culture, governance, and engineering, proving the power of a security-first mindset.
First evening on hack the box Paid Members Public
Exploring Hack The Box has been an eye-opener, giving me a fresh perspective on the red team mindset as someone who typically works on defense.
For starters, what is Passkeys? Paid Members Public
Explore how passkeys replace passwords for enhanced security and simpler logins, featuring Entra ID.
Use case: Phishing resistant MFA of a privileged role Paid Members Public
Protecting privilege roles with Microsoft Entra Identity Governance. We explore Authentication Context, Authentication Strength, and more to secure important areas.
Continuous Access Evaluation (CAE): The Silent Security Hero Paid Members Public
Discover the intricacies of Continuous Access Evaluation (CAE), the silent hero in token security. Learn how CAE enhances real-time evaluation, the importance of claim challenges, and its integration into the modern security framework.
The Mysterious Life of PRT: The Beginning Paid Members Public
In this series, we'll journey into the world of Primary Refresh Tokens (PRT), exploring their role in modern authentication protocols across multiple platforms.
Primary Refresh Token on iOS Devices Paid Members Public
I recently wrote a blog post about the complex operations of PRT on iOS devices. 📱✨If you're an IT professional looking to expand your knowledge, this one is for you. Join me as I delve deeper into the in triguing world of Azure AD and PRT. 🔐🚀
Modern Auth and Legacy Auth Paid Members Public
Secure authentication protocols that protect sensitive data and prevent unauthorized access are crucial in today's world of evolving cybersecurity threats. With so many authentication methods, it can be hard to choose. This blog post compares modern and legacy authentication protocols.