Packt Publishing Interview with Sasha Kranjac

  • Post category:AzureBooks

In connection to my recently published book, "Microsoft Defender for Cloud Cookbook", Packt Publishing recently published an interview with me, and I'd like to take an opportunity to repost it. Sasha Kranjac is the author of Microsoft Defender for Cloud Cookbook; we got the chance to sit down with him and find out more about him experience of writing with Packt. Q: What are your specialist tech areas?Sasha: Security – cloud and hybrid Q: How did you become an…

Continue ReadingPackt Publishing Interview with Sasha Kranjac

Microsoft 365 security: Where to look?

Microsoft 365 is a comprehensive suite that encompasses a broad area of products and services and, what is more important, it has access to our data. All of these should be adequately protected and secured, but where to look, where to start, what to configure first? You must understand that security landscape of today is much different than it was five, ten or more years ago. Data residency changed over the years, consequently security boundaries…

Continue ReadingMicrosoft 365 security: Where to look?

New wave: Microsoft Security Certifications

Recently, well few months ago, Microsoft announced a new wave of security exams and certifications as a response to a strong market demand and a need that filled much needed space in Microsoft certification portfolio. Four new security exams that were initially available on market in Beta versions in March are: Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals Exam SC-200: Microsoft Security Operations Analyst Exam SC-300: Microsoft Identity and Access Administrator Exam SC-400: Microsoft…

Continue ReadingNew wave: Microsoft Security Certifications

Microsoft Passwordless Authentication: The End of Passwords?

  • Post category:Azure

Passwords have been with us for ages. In early 60s, at MIT, researchers started to explore possible ways to enable computer systems to tell the difference between users who were using the systems, or to find a way to identify, or verify that the users are who they say they are, that is - to authenticate users. In 1961 an MIT employee printed a list of passwords and distributed it to other users - it…

Continue ReadingMicrosoft Passwordless Authentication: The End of Passwords?

Zero Trust security: A Microsoft Approach

What is this “Zero Trust” everyone is talking about these days? Under what rock has this term been hiding all the time? What “Zero trust” means anyway? The zero-trust concept or, the concepts that zero trust encompasses, are not new at all. During the Jericho Forum in 2003, the term de-perimeterisation was discussed – ways to protect an organization’s data and systems’ boundary by removing a boundary between outside networks and an organization and protecting…

Continue ReadingZero Trust security: A Microsoft Approach