Yashure SecurityGETTING SENTINENTAL:P2Welcome to the next part of ‘Getting Sentinental’. In the previous part, we explored the features ‘Data Connections’, ‘Incidents’ and…Nov 10, 2023Nov 10, 2023
Yashure SecurityGETTING SENTINENTAL:P1Welcome to the next part of ‘Getting Sentinental’. In the previous part, we explored the fundamentals of a SIEM and SOAR, their…Nov 7, 2023Nov 7, 2023
Yashure SecurityGETTING SENTINENTAL:P0This blog series will be beneficial for those who are planning or already working on getting to learn and know about the first and only…Jun 12, 2023Jun 12, 2023
Yashure SecurityConducting Baseline Assessments in Microsoft Defender for EndpointCompliance, this is what the blog is about. Every organization is concerned about being compliant against one or the other standards and/or…Jun 4, 2023Jun 4, 2023
Yashure SecurityExploring Conditional Access App Control with Conditional Access PoliciesA lot of us have been using Conditional Access Policies (CA) for securing user sign-in experiences based on various telemetries like device…Jun 3, 2023Jun 3, 2023
Yashure SecurityExploring ‘Attack Simulation Training’ in Microsoft Defender for Office365User awareness can prove has proven to be a very critical aspect in securing the people and eventually organizations from a cyberattack…May 27, 2023May 27, 2023
Yashure SecurityInvestigating ‘Initial Access’ incidentHere I’m sharing my experience of investigating an initial access incident observed in one of the client environments. As a disclaimer…May 20, 2023May 20, 2023