The recent Executive Order on AI by President Biden heralds a new era in AI governance, with profound implications for security teams. This guide will delve into what this order means for these teams, focusing on safety, security, and privacy in AI applications.
Unpacking Azure’s Private Subnet – Closer Look at Security and Functionality
Let’s dive into a new feature in Azure virtual networking: the Azure private subnet. It’s more than just a feature, it’s a strategic approach to enhancing network security and management.
Albeit, in our opinion, a few years late.
Note: AWS has always required customers to provide explicit outbound connectivity.
Discovering Attack Paths in Microsoft Azure for Enhanced Security
We’re changing the way consultants assess Azure Subscriptions and detect Attack Paths. All you need is “Reader” access to an…
Uncovering Lateral Movement Paths in Azure
In the sprawling metropolis of cloud environments, Azure shines as a central hub, teeming with a myriad of services. However, amidst this vast expanse, lurk unseen alleyways known as lateral movement or attack paths, which could be exploited by adversaries to traverse through the cloud undetected.
Common Azure Kubernetes (AKS) Misconfigurations and How to Fix Them
In this article, we will detail the most common AKS misconfigurations, explain their security implications, and provide tips on how to detect and fix them using Azure CLI or Resource Graph examples.
Top 5 Azure VM Security Blunders That Get You Owned
Top 5 Azure VM Security Blunders that will get you owned As more and more businesses embrace Azure Virtual Machines…
Is Your Azure SQL at Risk? Learn How to Secure It with this Step-by-Step Guide
Azure SQL is a cloud-based relational database management system that is widely used by businesses and organizations around the world.…
Identifying and Securing Hidden Attack Paths in Azure Infrastructure
Lateral movement attacks are a significant risk facing organizations that operate in the cloud. These attacks occur when an attacker…
How to protect SaaS with Strong Azure MFA Authentication
Often customers ask us how they can protect the information stored within ARGOS from individuals that should not have access…
How to Secure an Azure Service Principal with Conditional Access
Identity and Access Management (IAM) is absolutely fundamental to a Cloud operation, however, sometimes you had to make allowances for…