State of Azure IAM 2023Identity and Access Management (IAM) is an essential component in any Azure security design. By effectively controlling access within an…Dec 31, 2023Dec 31, 2023
Using AzDanglingDnsFinder to find vulnerable DNS names for Azure sub-domain takeoverI recently put together a tool to automate the identification of DNS names that are vulnerable to sub-domain takeover in an Azure pentest…Nov 21, 20231Nov 21, 20231
Azure CloudSec Practitioner Series: 1 — Deploying an Azure PenTest VMAs the field of cloud security evolve, so too does the skills and expertise necessary to excel in this domain. Beyond understanding the…Sep 9, 2023Sep 9, 2023
Lessons from Storm-0558Dive deep into Azure cloud security, Azure pentesting, and expand your multi-cloud expertise with our upcoming courses! 🚀Sep 7, 2023Sep 7, 2023
State of the Multi-Cloud Global Infrastructure (March 2023)The cloud computing market is experiencing strong growth and the top four cloud providers (AWS, Azure, GCP, Alibaba Cloud) are leading the…Mar 31, 2023Mar 31, 2023
Published inAWS Security User Group West AfricaState of AWS Community in West Africa and Africa — Feb 2023Our team is passionate about providing a valuable and engaging experience for the AWS security community in West Africa. We believe in…Feb 22, 20231Feb 22, 20231
Published inAWS Security User Group West AfricaAWS Cloud Security User Group West Africa: Study and Win a Prize Sessions ReportIntroduction:Feb 15, 2023Feb 15, 2023
Deploying GitHub as a Service in Azure (GitHub AE)GitHub is a platform that allows developers to collaborate on projects, share code, automate integration and deployments. There are…Jan 6, 2023Jan 6, 2023
State of Azure IAM 2022Azure Identity and Access Management (IAM) is a critical component of any Azure security design. It is responsible for controlling access…Dec 28, 2022Dec 28, 2022