Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Neeraj Kumar

Understanding Azure DevOps and Building CI/CD Pipeline

Are you interested in learning about the tool that helps to automate and manage the complete software development lifecycle? Well, Azure DevOps is the answer for you, but before we...

Read More

Azure Automation using PowerShell Runbooks

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Read More

How to Use Azure Sentinel for Security Analytics and Threat Intelligence

Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the...

Read More

How to Use Azure Private Endpoints to Restrict Public Access to WebApps

As an Azure administrator or architect, you are sometimes asked the question: “How can we safely deploy internal business applications to Azure App Services?” These applications characteristically are: Not accessible...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.