Employees open 28% of business email compromise attacks – Learn why and how to boost your security

In this guest blog post, Arun Singh, VP of Marketing at Abnormal Security, explores the impact an organization’s workforce has on its cybersecurity and why it’s essential to eliminate opportunities for employees to engage with malicious emails.
 
Continue reading Employees open 28% of business email compromise attacks – Learn why and how to boost your security

Exploring Virtual Machine offers in the Azure marketplace

Overview
Virtual Machine (VM) offers in the Azure Marketplace provide users with pre-configured, ready-to-deploy virtual machine images for various operating systems, applications, and configurations. VM offers enable quickly spinning up new VMs in th… Continue reading Exploring Virtual Machine offers in the Azure marketplace

Automated Secure Infrastructure for Self Hosted Integration Runtime in Azure Data Factory Terraform

Purpose/Summary
This purpose of this project is to document how to securly automate a self hosted integration runtime (SHIR) for Azure Data Factory using terraform.
 
According to Microsoft Documentation , a self-hosted integration runti… Continue reading Automated Secure Infrastructure for Self Hosted Integration Runtime in Azure Data Factory Terraform

Improved experience for managing the default Azure security recommendations

Introduction
To improve your overall security posture, you have to implement security recommendations for your environment.
The Microsoft Cloud Security Benchmark is a Microsoft-authored set of guidelines that are being adopted as the default for secur… Continue reading Improved experience for managing the default Azure security recommendations