Senserva helping customers with Microsoft Sentinel Notebooks
We have been seeing a strong interest in using our open source solutions for quick creation of Microsoft Sentinel Notebooks. Please let us know if have specific needs and we [...]
We have been seeing a strong interest in using our open source solutions for quick creation of Microsoft Sentinel Notebooks. Please let us know if have specific needs and we [...]
This blog is written by Jan Bakker. When organizations have implemented Azure Active Directory Conditional Access, the real game is on. How to make sure that you stay in control [...]
(From our guest and good friend, Cameron Fuller and his detailed Azure Sentinel Blog) Welcome to the “Introducing” series (check here for the full list of blog posts in this series). In [...]
https://www.getrevue.co/profile/AzureSentinelToday/issues/azure-sentinel-this-week-issue-14-626325 ... Secondly, I want to highlight something that should be of interest to anyone that’s been in the security biz for any length of time. Anyone remember the name Shavlik? [...]
As businesses grow, so do their employee base. This leads to new users coming in, old users leaving the network, and current users changing their duties. As things change, your [...]
Traditional Tokens Tokens are the core of API security on both Cloud and Kubernetes . (aka OAuth 2.0 Authorization) Since APIs most often give full read/write access to all things [...]
When recently overviewed two key items in Microsoft 365 user (IAM) security: PIM and Conditional Access. Another big part of AAD is the monitoring and response of Risky Users via [...]