In the ever-evolving landscape of cybersecurity, organizations face increasingly sophisticated threats that target their critical assets. One common tactic employed by attackers is lateral movement, wherein malicious actors move horizontally…
Latest Posts - Page 8
Demystifying Authentication in Microsoft Entra ID
In the realm of cloud security, Microsoft Entra ID stands as a bastion of authentication prowess. Its robust authentication mechanisms revolve around tokens, validity periods, and a plethora of protocols.…
Difference between delegated and application permissions in Microsoft Entra ID
In Microsoft Entra ID, there are two types of permissions that can be assigned to an application: delegated permissions and application permissions. Let’s delve deeper into the differences between delegated…
How to reset domain admin password on an Azure VM
There are cases when you forget the local admin password of a machine. Or worse, someone changes your password, such as a threat actor in a cybersecurity incident. This happens,…
How to secure your email with SPF, DKIM and DMARC
Email is usually a critical part of corporate communication these days. Without a functional email, companies can lose orders and therefore money for example. Therefore, email security should be a…