Re-awarded as Microsoft Most Valuable Professional (MVP) in two categories again!

So happy to have been awarded as a Microsoft Most Valuable Professional (MVP) Award in the two categories again: Security and Microsoft Azure!!Big thanks to everyone who supported me in this journey!  Now that I am awarded as a Microsoft Security MVP and a Microsoft Azure MVP does not mean the challenging work is over. My passion is security, obviously, and Microsoft Azure as well and, although I might take a day off, I will…

Continue ReadingRe-awarded as Microsoft Most Valuable Professional (MVP) in two categories again!

Microsoft Learn Cloud Skills Challenge!

I have created two exciting Microsoft Learn Cloud Skills Challenges to sharpen your skills: Kusto Query Language (KQL) and Azure Data Explorer Cloud Skills Challenge, and Microsoft Defender for Cloud Apps Advanced Scenarios Cloud Skills Challenge. In this Kusto Query Language (KQL) Collection you will take an exciting journey and learn how to write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Sentinel, Azure Data Explorer, and…

Continue ReadingMicrosoft Learn Cloud Skills Challenge!

Packt Publishing Interview with Sasha Kranjac

  • Post category:AzureBooks

In connection to my recently published book, "Microsoft Defender for Cloud Cookbook", Packt Publishing recently published an interview with me, and I'd like to take an opportunity to repost it. Sasha Kranjac is the author of Microsoft Defender for Cloud Cookbook; we got the chance to sit down with him and find out more about him experience of writing with Packt. Q: What are your specialist tech areas?Sasha: Security – cloud and hybrid Q: How did you become an…

Continue ReadingPackt Publishing Interview with Sasha Kranjac

Microsoft Passwordless Authentication: The End of Passwords?

  • Post category:Azure

Passwords have been with us for ages. In early 60s, at MIT, researchers started to explore possible ways to enable computer systems to tell the difference between users who were using the systems, or to find a way to identify, or verify that the users are who they say they are, that is - to authenticate users. In 1961 an MIT employee printed a list of passwords and distributed it to other users - it…

Continue ReadingMicrosoft Passwordless Authentication: The End of Passwords?

Zero Trust security: A Microsoft Approach

What is this “Zero Trust” everyone is talking about these days? Under what rock has this term been hiding all the time? What “Zero trust” means anyway? The zero-trust concept or, the concepts that zero trust encompasses, are not new at all. During the Jericho Forum in 2003, the term de-perimeterisation was discussed – ways to protect an organization’s data and systems’ boundary by removing a boundary between outside networks and an organization and protecting…

Continue ReadingZero Trust security: A Microsoft Approach