Toh DanielPerforming attack scenarios on access token theft (With/Without Entra ID Token Protection)Microsoft Entra ID Conditional Access Feature: Token ProtectionJul 21Jul 21
Toh DanielMicrosoft Sentinel: Using Azure OpenAI to assist Security Analyst with incident respond and…In most of my conversation with SecOps team, there is a consistent observation that the team often lack experience Security Analysts…Aug 13, 2023Aug 13, 2023
Toh DanielMicrosoft Sentinel: Use of Logic App to automatically receive Email notification on new incidents.Unlike Microsoft Defender for Cloud, Sentinel does not have a direct setting on the Azure Portal to configure email notification when new…Mar 5, 20231Mar 5, 20231
Toh DanielAchieving an initial Security Baseline on Azure CloudAzure Cloud provides a platform for us to create and host our workload for fast deployment as compared to on-premises. Cloud adoption comes…Feb 15, 2023Feb 15, 2023
Toh DanielBehind the scenes -understand what the hacker doesWhen we look at the activities a bad actor does to achieve his goal, there is a known approach known as the attack kill chain methodology…Oct 16, 2022Oct 16, 2022
Toh DanielDifference between TLS, IPSEC and Private leased line (MPLS)In my engagement with project teams and solutions architect, there are often discussion on the various methods to use to secure safe…Aug 13, 20221Aug 13, 20221
Toh DanielDefending against persistent reverse shell attack on end-user devicesCorporate users’ laptops can be the most targeted source by attackers. It has a larger attack surface area due to its direct exposure to…May 23, 2022May 23, 2022