Syed Mansoor HashmiforSyed Mansoor Hashmi's blogsyedhashmi.hashnode.net·Aug 7, 2022Security in the CloudWhen you think about security in the cloud, always consider the multi-layer approach. It defines the multiple layers of security controls in the cloud to ensure that if a security attack is not caught in one layer, it will most likely be caught in th...Discuss·148 readsAzure
Joseph MastertonforMasterton.cloudjosephmasterton.hashnode.net·Apr 8, 2023Azure PIMpin' Ain't EasyAzure Privileged Identity Management (PIM) is a cloud-based service that helps organizations manage, monitor, and control access to resources within Azure Active Directory (AD). It enables organizations to identify, manage, and protect their most cri...Discuss·80 readsAzure SecurityAzure
Syed Mansoor HashmiforSyed Mansoor Hashmi's blogsyedhashmi.hashnode.net·Jul 16, 2022Set Up A Linux Based (OpenVPN) VPN ConcentratorSet Up A Linux Based (OpenVPN) VPN Concentrator In this blog I would to share how we install the VPN concentrator/gateway on linux server. In the cloud we used VPN. A VPN allows users secure access to a company's cloud resources, files, data or appli...Discuss·59 readsAzure
Joseph MastertonforMasterton.cloudjosephmasterton.hashnode.net·Apr 8, 2023Conditional Access: Because Sometimes, Even Your Grandma Needs Extra SecurityLet's face it, we all love our grandmas. But when it comes to technology, they're not exactly the most security-savvy people. That's where Conditional Access comes in. It's like a protective bubble around your grandma's Azure Active Directory account...DiscussAzure SecurityAzure
Joseph MastertonforMasterton.cloudjosephmasterton.hashnode.net·Apr 8, 2023Azure PIMpin' Ain't EasyAzure Privileged Identity Management (PIM) is a cloud-based service that helps organizations manage, monitor, and control access to resources within Azure Active Directory (AD). It enables organizations to identify, manage, and protect their most cri...Discuss·80 readsAzure SecurityAzure
Syed Mansoor HashmiforSyed Mansoor Hashmi's blogsyedhashmi.hashnode.net·Aug 17, 2022Securing a Web Application in Azure Leveraging the Cisco NextGen Firewall.Securing a Web Application in Azure Leveraging the Cisco NextGen Firewall. In this blog we are going to learn how to secure the web application in Azure leveraging Cisco NextGen firewall and IDS/IPS. When you think about security in the cloud, alway...Discuss·263 readsAzure
Syed Mansoor HashmiforSyed Mansoor Hashmi's blogsyedhashmi.hashnode.net·Aug 7, 2022Security in the CloudWhen you think about security in the cloud, always consider the multi-layer approach. It defines the multiple layers of security controls in the cloud to ensure that if a security attack is not caught in one layer, it will most likely be caught in th...Discuss·148 readsAzure
Syed Mansoor HashmiforSyed Mansoor Hashmi's blogsyedhashmi.hashnode.net·Jul 16, 2022Set Up A Linux Based (OpenVPN) VPN ConcentratorSet Up A Linux Based (OpenVPN) VPN Concentrator In this blog I would to share how we install the VPN concentrator/gateway on linux server. In the cloud we used VPN. A VPN allows users secure access to a company's cloud resources, files, data or appli...Discuss·59 readsAzure