A new book: Mastering Microsoft 365 Security and Compliance

I am thrilled to announce my new book “Mastering Microsoft 365 Security and Compliance” is now available for preorder on Amazon!This would not be possible without co-author Omar Kudovic, my dear colleague and friend, a dedicated and notable expert in the field! Stay tuned and make sure you come back for exciting news as we finalise the book! Visit Amazon page for preorders, grabbing your copy, and details about the book. Here is the Packt Publishing…

Continue ReadingA new book: Mastering Microsoft 365 Security and Compliance

Microsoft Learn Cloud Skills Challenge!

I have created two exciting Microsoft Learn Cloud Skills Challenges to sharpen your skills: Kusto Query Language (KQL) and Azure Data Explorer Cloud Skills Challenge, and Microsoft Defender for Cloud Apps Advanced Scenarios Cloud Skills Challenge. In this Kusto Query Language (KQL) Collection you will take an exciting journey and learn how to write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Sentinel, Azure Data Explorer, and…

Continue ReadingMicrosoft Learn Cloud Skills Challenge!

Microsoft 365 security: Where to look?

Microsoft 365 is a comprehensive suite that encompasses a broad area of products and services and, what is more important, it has access to our data. All of these should be adequately protected and secured, but where to look, where to start, what to configure first? You must understand that security landscape of today is much different than it was five, ten or more years ago. Data residency changed over the years, consequently security boundaries…

Continue ReadingMicrosoft 365 security: Where to look?

Zero Trust security: A Microsoft Approach

What is this “Zero Trust” everyone is talking about these days? Under what rock has this term been hiding all the time? What “Zero trust” means anyway? The zero-trust concept or, the concepts that zero trust encompasses, are not new at all. During the Jericho Forum in 2003, the term de-perimeterisation was discussed – ways to protect an organization’s data and systems’ boundary by removing a boundary between outside networks and an organization and protecting…

Continue ReadingZero Trust security: A Microsoft Approach