Resources No resource found - Provide Security Role Access for D365 OutlookMar 14, 2024. In this article, we will customize permissions, manage user access, and enforce Role-Based Access Control (RBAC). Optimize Microsoft 365 settings to tailor access rights, enhancing data protection and organizational compliance.
- What are Solidity Modifiers and How do they boost the security of Smart Contracts?Dec 28, 2023. Explore the power of Solidity modifiers! From basic syntax to advanced implementations, learn how these tools enhance security, reusability, and efficiency in smart contract development.
- Optimizing File Security with Windows SandboxOct 26, 2023. Expert Tips for Utilizing Windows Sandbox to Enhance Downloaded File Security provides valuable insights on using Windows Sandbox, a built-in virtualization feature in Windows operating systems, to bolster security when handling downloaded files. The article offers expert guidance and best practices for leveraging this tool effectively. By isolating potentially harmful files in a secure, sandboxed environment, users can safeguard their systems from malware and other threats, making it an essential addition to any security-conscious individual or organization's cybersecurity toolkit. These tips empower users to safely analyze and execute files without risking their primary system's integrity, ultimately enhancing overall cybersecurity in an increasingly digital and interconnected world.
- Web API Security in .NET CoreOct 03, 2023. Web API Security in .NET Core
- Elevating Cloud Security with Azure Key VaultSep 01, 2023. In a digital age where data security is crucial, Azure Key Vault by Microsoft Azure stands as a powerful solution. It centralizes and secures cryptographic keys, secrets, and certificates in the cloud. This enhances data management, access control, and compliance, offering a robust and streamlined approach to safeguarding sensitive information in a cloud-driven world.
- Best Practices for Maintaining Security and Preventing Vulnerabilities in C#Sep 01, 2023. This article will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to prevent injection attacks, using parameterized SQL queries, using cryptography to protect sensitive data, using HTTPS to protect data in transit, avoiding hardcoding secrets in code, and keeping code up to date with the latest security patches and updates.
- Empower Resource Security with Azure RBACAug 30, 2023. The title provided is concise and should be easily searchable on Google. However, the final search ranking depends on various factors, including the specific keywords used, competition, and other SEO practices.
- Future Scope of Cyber Security Engineer in IndiaAug 25, 2023. In this article, you will learn more about what the future holds for cyber security engineers in India.
- Enhancing Security and Access Management with Microsoft EntraAug 24, 2023. Unveiling Microsoft Entra: Elevating Secure Identity and Access Management" is a resource that likely introduces and explores Microsoft Entra, a solution focused on enhancing identity and access management practices within the realm of cybersecurity. The content would likely cover the features, benefits, and implementation considerations of Microsoft Entra to provide organizations with a comprehensive understanding of its capabilities.
- Azure IoT Security : Safeguarding the Internet of ThingsAug 02, 2023. Explore Microsoft's Azure IoT Secure, a robust platform fortifying IoT against cyber threats. With secure communication, edge security, and threat detection, organizations confidently embrace IoT technologies for a protected interconnected world.
- Ensuring Secure Coding in C#: Maintaining Security Jul 20, 2023. The article on secure coding in C# applications, written by Ziggy Rafiq, is a must-read for developers who want to fortify their applications against potential vulnerabilities and security threats. By implementing the essential best practices suggested in the article, developers can effectively safeguard sensitive data and ensure a secure user experience.
- Azure Functions Security Best PracticesJul 13, 2023. Azure Functions Security Best Practices
Ensuring a Secure Serverless Environment
- How to Maintain Application Security and Prevent Vulnerabilities in C#?Jul 12, 2023. This article provides essential best practices for ensuring secure coding in C#. By implementing these practices, developers can maintain the security of their applications and mitigate vulnerabilities. Learn about secure password handling, input validation, parameterized queries, cryptography, secure session management, and staying up to date with security patches. With these best practices, developers can enhance the security of their C# applications and protect against potential security threats.
- How to Add Security Headers to Your Website Using .htaccessMay 18, 2023. Want to know how to add security headers to your website using .htaccess? Read this blog and add content security policy header in wordpress site.
- Enhancing Security with Microsoft 365 Secure ScoreMay 18, 2023. By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
- Adapting to AWS's New Default Security Settings: Ensuring Public Website Access Using S3 WebsitesMay 15, 2023. Solve the impact of recent AWS policy changes, understand the challenges of restricted access, and explore the solution to overcome Access Denied errors. Learn how to adapt your access control strategies to ensure your websites are publicly accessible and discover the key steps to configuring S3 bucket policies for seamless public access.
- Why You Should Use Vooki DAST For Dynamic Application Security TestingMay 05, 2023. Scanning and auditing your web applications is now made easier with the advent of Vooki. A Free version of Vooki is also available that gives you a perfect scan report about the scanned applications.
- 5 HTTP Security Headers You Should Know For SEOMay 02, 2023. Being an SEO beginner, it's easy to overlook the security headers in the regular audits. However, security headers should be your top priority when it comes to optimizing your website. In this article, we'll discuss five HTTP security headers that you should know for SEO.
- Azure Storage Security Focuses On Five Key AreasApr 28, 2023. In this article, we will learn Azure storage security focuses on five key areas. In our next article, we will learn about Azure File Storage Service.
- SQL Server Security Best PracticesApr 25, 2023. SQL Server Security Best Practices
- Power Apps - Security Trimmed Controls Based On SharePoint GroupsMar 20, 2023. In this article we will see how to show/ hide some controls in a Power Apps screen based on logged in user’s role. We have SharePoint online as data source and managing all the security roles using SharePoint groups. Remember we are no using M365 groups only SharePoint groups. In Power Apps there is no direct way to check if user is part of SharePoint group or not. So, you cannot security trim (show/ hide or enable/ disable) any control on Power Apps screen directly based on whether user is a member of SharePoint group or not.
- How To Create Model Driven Apps With Security Role RestrictionFeb 08, 2023. How to Create Model Driven Apps With Security Role Restriction.
- Activate Enterprise Mobility + Security E5 Licenses Using Azure AD For FreeFeb 01, 2023. Microsoft Enterprise Mobility + Security (EMS) is intelligent mobility management and security platform. What this means is that EMS helps protect and secure your organization with its products that act to increase security features of Windows 10 and Microsoft 365.
- How To Configure Network Security For Azure App Service PlanNov 30, 2022. In this article, you will learn how to configure network security for azure app service plan.
- Azure Synapse Analytics Security - Dynamic Data MaskingAug 09, 2022. In this article, you will learn about Azure Synapse Analytics Security - Dynamic Data Masking.
- A Simple Dummy File Security System Using C LanguageMar 21, 2022. A File Security System is a console application that can be used to prevent unauthorized access to a file. It prompts the user to enter a password before he/she can access the particular file. The System, if the password entered is correct,
Opens the file in reading mode and displays the characters of the file on the screen.
However, if the entered password is incorrect the system will display a message and
immediately exit itself.
- Top 10 Web Application Security RisksFeb 28, 2022. This is a web app security discussion.
- SQL Security Tips - Implement Row Level Security QuicklyFeb 10, 2022. RLS (row-level security) is one of the important concepts we need to understand to secure data access at a different role.
- SQL Security Tips - Dynamic Data Masking To Secure Data AccessFeb 09, 2022. There are various aspects of security, and Dynamic Data Masking is one of the important concepts to know. We will describe here what is Dynamic masking and how to implement it with step-by-step examples.
- Cloud Computing Security ThreatsSep 15, 2021. This is a second article from the series of article about security as a service for cloud computing. In this article, we will explore about more cloud security threats in detail
- Web Security Vulnerabilities On User Session And Username Iteration Jul 29, 2021. In this article, you will learn about Web Security Vulnerabilities on User Session and Username Iteration.
- Web Security Vulnerabilities On SSL/TLS Protocols And Set-Cookie Attributes Jul 22, 2021. In this article, you will learn about Web Security Vulnerabilities On SSL/TLS Protocols And Set-Cookie Attributes.
- Web Security Vulnerabilities On Clickjacking And Security HTTP Headers And Information LeakageJul 07, 2021. In this article, you will learn about the common web security vulnerabilities with Remediation Technique.
- Share Dataverse For Teams Apps And Add Security To Associated TableMay 21, 2021. In this article, you will learn how to grant role based access in Dataverse table which is part of the app.
- Altering Item Insights Security In Microsoft Graph Using REST APIApr 26, 2021. Item insights protection settings give the capacity to arrange the permeability of bits of insights obtained from Microsoft Graph
- Altering Item Insights Security In Microsoft Graph Using PowerShell CommandsApr 23, 2021. Item experiences security settings give the capacity to arrange the perceivability of insights which is got from Microsoft Graph
- Manage Security Alerts In Azure Security CenterDec 30, 2020. In this article, you will learn how to manage security alerts in azure security center.
- IT Security vs. Secure Coding Sep 18, 2020. In this article, you will learn about IT Security vs. Secure Coding.
- Protect APIs With Security Headers Using Azure API Management PoliciesAug 24, 2020. In this article, you will learn about how to protect APIs with Security Headers using Azure API Management Policies.
- Nature Of Security FlawsAug 19, 2020. In this article, you will learn about the nature of security flaws.
- Cyber Security - What Is Risk?Aug 17, 2020. In this article, you will learn about risk in Cyber Security.
- Secure Web Application Using HTTP Security Headers In ASP.NET CoreAug 17, 2020. In this article, you will learn about Secure Web Application using HTTP Security Headers in ASP.NET Core.
- Fetch An Access Token To Access Microsoft Graph API Using Msal.JS (Microsoft Security Authentication Library)Jul 03, 2020. In this article, I have explained how to fetch an access token using MSAL JS.
- PnP Security Trimmed Control In SharePoint FrameworkApr 24, 2020. In this article, you will see how to use PnP Security Trimmed Control in SharePoint Framework.
- Get Users Or Members From The AD Security Group In PowerAppsApr 03, 2020. In this blog, we will discuss about how we can get the users information from the specific Security Group in Power Apps.
- Azure Blob Storage With Security Using .NETDec 19, 2019. How to create Azure Blob Storage in Azure using Blob security and push and pull images into Azure Blob using .NET code.
- Azure Security Foundation: Safety First In An Uncertain WorldNov 20, 2019. In this article you will learn about Azure Security Foundation -- Safety First in an Uncertain World.
- How To Identify The Security Issues And Use Security Scanner In Google Cloud PlatformOct 16, 2019. In this article, I’m going to describe how to deploy a sample Hello world application to run Security scanner.
- Implement Brandings And Security To Your Office 365May 31, 2019. This article may help you to customize your Office 365 with your existing company theme and implement a secure login to users.
- WCF Message Security Using CertificatesMay 23, 2019. In this article, you will learn about WCF Message Security using certificates.
- ASP.NET Core Security HeadersApr 16, 2019. In this article, you will learn about ASP.NET Core security headers.
- Azure Security Strategies You Ought To KnowApr 01, 2019. In this video, learn Azure cloud security and how it is much better.
- I Don’t Know Crap About Security (Or At Least I Didn’t)Jan 21, 2019. Recently, I was involved in a project where I got a chance to work on its security and frankly, I didn't know anything about security. In this write-up, I have shared how I went through it.
- AspNetCore.Security.Jwt - JWT Bearer Token Security PackageOct 23, 2018. I have built a package which integrates JWT Bearer Token Security into an Asp Net Core 2.0+ application.
- Azure IoT - Good Security PracticesOct 13, 2018. Businesses face security, privacy and compliance challenges which are unique to the IoT. Security for IoT solutions includes ensuring that devices are securely provisioned, that there is secure connectivity between the devices and the cloud, as well as secure data protection in the cloud during processing and storage. An in-depth security strategy is needed to secure an Internet of Things (IoT) infrastructure.
- Extended Security Updates No More FreebiesSep 10, 2018. As data professionals, we should always strive to keep our systems updated and patched to ensure proper security of our environments. Microsoft has moved away from releasing service packs to releasing just cumulative updates and the occasional hotfixes. These hotfixes may or may not be security related, but it behooves us to ensure things get patched. Not just from a SQL Server perspective but also from a Windows perspective.
- Cloud Security Trends 2018 - Let's Predict The Upcoming DaysJun 12, 2018. It is clear from data breach statistics from 2017 that IT industries need to work more on online data storage protection.
- Strategic Alert and Security ConfigurationApr 17, 2018. Today I ran into something on a client-server that unfortunately I see too often. The DBA goes through the trouble of configuring and setting up alerts/operators but doesn’t really understand what the options in the configurations mean. So, unfortunately, that means they take the CYA (cover your ass) approach and they check all of them. Now, not only have I seen this with alerts but also with things like security configurations as well. My advice is to always take a second and research what each option is before you check the little boxes, especially when it comes to security. Always follow the rule of less is more.
- Step-By-Step Demo Of Creating Azure Virtual Network, Subnets And Network Security Groups - Part ThreeMar 21, 2018. In this article, I am going to show you how to create Azure Virtual Machines, Subnets and Network Security Groups.
- Step-By-Step Demo Of Creating Azure Virtual Network, Subnets And Network Security Groups - Part TwoMar 20, 2018. In this article, I am going to show you how to create Azure Virtual Network, Subnets and Network Security Groups.
- Secure .NET Core Applications From CSRF Attack: .NET Core Security - Part TwoMar 20, 2018. If we compare .NET Core with .NET as far as the resolution of CSRF attacks is concerned, The ValidateAntiForgeryToken attribute and The AntiForgeryToken HTML helper(@Html.AntiForgeryToken()) are still there in .NET Core. On top of these, there are some more powerful options we have in .NET Core.
- Step-By-Step Demo Of Creating Azure Virtual Network, Subnets And Network Security Groups - Part OneMar 19, 2018. In this article, I am going to show a step by step demo of how to create Azure Virtual Networks, Subnets and Network Security Groups.
- Enforce SSL And Use HSTS In .Net Core(2.0) Security - Part OneFeb 20, 2018. SSL (Secure Sockets Layer)is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication.
- Blob Security On Azure Storage - Part ThreeFeb 01, 2018. Shared Access Signature is shortly called as SAS, SAS is a URI that grants restricted access rights to Azure Storage resources, you can provide a SAS to clients who should not be trusted with your azure storage account key but whom you wish to delegate access to certain storage account resources. By distributing a shared access signature URI to these clients, you can grant them access to resource for a specific period time. The Service – Level SAS delegates access to a multiple storage services like blob, files, tables and queues.
- Cyber Security - A Big Opportunity For DevelopersDec 28, 2017. In this article, I will cover another growing tech trend, cyber security, that has a growing need of experts, and presents a big opportunity for developers and IT professionals, who are looking to secure their future.
- Hands-Free Security Scanning Within .NET ApplicationsDec 10, 2017. I'm sure if you follow any news sources at all, you see countless hacks, breaches, and leaks from various big-name companies which you might assume would be better at protecting your information. Now most of these incidents can probably be related to non-technical issues like social engineering, but not all of them.
- Top 10 Web Application Security Risks In 2017Dec 04, 2017. List of Top 10 Web application security risks of 2017 and beyond.
- Missing Security Section In PWA Settings In Project Server 2016Sep 18, 2017. In this article, we will discuss and solve the issue of Missing Security Setting in PWA Settings in Project Server 2016 / 2013.
- Track Security Role Changes Using AuditingAug 03, 2017. Have you been in a situation where the client is complaining about sudden access to unwanted entities/not required for their process or suddenly they are not able to perform some set of actions? If yes this article is going to help you.
- Audit Log Search In Security And Compliance Center In Office 365Jun 16, 2017. Audit log search in Security and Compliance center in Office 365.
- Microsoft Azure Security And Protection Against DDoSJun 14, 2017. Microsoft Azure Security And Protection Against DDoS.
- Alert Policies In Office 365 Security And Compliance CenterJun 09, 2017. Alert Policies In The Office 365 Security And Compliance Center.
- SharePoint 2016 Central Admin - Security - Define Blocked File TypeMay 15, 2017. In this article, you will learn about SharePoint 2016 Central Admin - Security.
- SharePoint 2016 Central Admin - Security - Manage TrustMay 09, 2017. This article teaches you about SharePoint 2016 Central Admin - Security - Manage Trust.
- SQL Server 2016 - Getting Started With Row Level Security FeatureApr 25, 2017. This article familiarizes you with SQL Server 2016 - Getting started with Row Level Security feature.
- Azure Security - Solution To Digital TransformationMar 30, 2017. In this article, I will illustrate steps with some real time scenarios to manage and secure digital transformation.
- Office 365 - Security Groups Management Using PowershellMar 22, 2017. In this article, we will discuss the automation scripts required for managing Security Groups in Office 365, using PowerShell.
- SharePoint 2016 Central Admin - Security - Configure Service AccountsMar 15, 2017. This article familiarizes you with SharePoint 2016 Central Admin - Security - Configure Service Accounts.
- SharePoint 2016 Central Admin - Security - Specify Authentication ProvidersMar 15, 2017. SharePoint 2016 Central Admin – Security – Specify authentication providers.
- How To Hide Security Settings In SharePoint Office 365 OnlineFeb 24, 2017. In this article, we will see how to hide/unhide the user settings in SharePoint Office 365 Online.
- SharePoint 2016 Central Admin - Security - Configure Password Change SettingsFeb 16, 2017. In this article, you will learn how to configure password change settings in SharePoint 2016 Central Admin.
- Cross Site Scripting (XSS) - A Client Side Web Security AttackFeb 10, 2017. This article will be focusing on cross site scripting attack and prevention in general.
- Overview Of IoT Security Risks Associated With The Healthcare IndustryFeb 10, 2017. In this article, you will learn about Healthcare IoT Security Risks and Protection Mechanisms.
- SharePoint 2016 Central Admin - Security - Manage Web Part SecurityFeb 05, 2017. In this article, you will learn how to manage Web part security in SharePoint 2016 central admin.
- SharePoint 2016 Central Admin - Security - Manage Antivirus SettingsFeb 04, 2017. In this article, you will learn how to manage antivirus settings in SharePoint 2016 central admin.
- SharePoint 2016 Central Admin - Security - Specify Web Application User PolicyFeb 03, 2017. In this article, you will learn how to specify web application user policy in SharePoint 2016 central admin.
- SharePoint 2016 Central Admin - Security - Manage The Farm Administrators GroupFeb 02, 2017. In this article you will learn how to manage the farm administrators group in SharePoint 2016 Central Admin.
- Manage Web Part Security In Web Applications In SharePoint 2013 Central AdministrationJan 02, 2017. In this article, you will learn how to set up web part security in web applications in SharePoint 2013 Central Admin.
- Azure Redis Cache Enhanced Security And Network IsolationDec 10, 2016. In this article, we will learn how to configure an enhanced security for Azure Redis Cache by isolating the access to Redis Cache within the Virtual Network (VNET).
- Network Security Groups In Azure NetworkingNov 20, 2016. In this article, we will learn the details about Network Security Groups in more detail.
- Overview of Azure Security CenterSep 06, 2016. In the article, you will learn about Azure Security Center.
- How To Use Security In Windows 10Aug 25, 2016. In this article, you will learn, how to use security in Windows 10.
- Top 10 Website Security Testing ToolsAug 22, 2016. In this article you will learn about the top 10 website security testing tools.
- Create Security Groups In SharePoint 2016 Using Web Service And Nintex Workflow 2016Jul 29, 2016. In this article, you will learn how to create Security Groups in SharePoint 2016, using Web Service and Nintex Workflow 2016.
- Configure Alerts On The Security And Compliance Center On SharePoint Office 365Jul 28, 2016. In this article, you will learn how to configure alerts on the Security and Compliance Center on SharePoint Office 365.
- Add And Remove Users From Security Group In SharePoint 2016, Using REST APIJul 25, 2016. In this article, you will learn how to add and remove users from Security Group in SharePoint 2016, using REST API.
- Remove User From Security Group On SharePoint Online And Office 365 Using Nintex WorkflowsJul 07, 2016. In this article, you will learn, how to remove the user from the security group on SharePoint Online and Office 365, using Nintex Workflows.
- Azure Security: Introduction To Azure Security CenterJun 24, 2016. In this article, you will learn about Azure Security Center.
- Service Assurance On The Security And Compliance Center On SharePoint Office 365Jun 22, 2016. In this article, you will learn about service assurance on the security and compliance center on SharePoint Office 365.
- Configure Search And Investigation On The Security And Compliance Center On SharePoint Office 365Jun 21, 2016. In this article, you will learn how to configure search and investigation on the security and compliance center on SharePoint Office 365.