Homepage
Open in app
Sign in
Get started
CyberDnevnik
Journaling through Cyberspace
Follow
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 3
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 3
This is part 3 and the last part of the exam guide for Azure Fundamentals.
Vedran Brodar
Sep 24
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 2
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 2
If you’ve come this far I can already tell you went through my Part 1 of the exam guide for Azure Fundamentals. If you haven't use the…
Vedran Brodar
Sep 19
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 1
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 1
If you want to get into the Cloud (in this case, Azure Cloud specifically), this is your fundamental exam that will get you started.
Vedran Brodar
Sep 15
Azure Key Vaults for Newbies: Secure Your Secrets with Ease
Azure Key Vaults for Newbies: Secure Your Secrets with Ease
I’m sure that you’ve had situations where you have asked yourself “OK, I have some certificates that we are using for SSL/TLS, also a few…
Vedran Brodar
Aug 2
Global IT outage — BSOD and CrowdStrike
Global IT outage — BSOD and CrowdStrike
Last week we witnessed one of the largest IT outages affecting the travel, banking, business, and health sectors worldwide in the form of…
Martina Lenić
Jul 23
Inside PC Health Check: Reversing Compatibility Checks — Part 2
Inside PC Health Check: Reversing Compatibility Checks — Part 2
Table of Contents
Hrvoje Filaković
Jul 19
Stop Drowning in Data: Tame Your Azure Logs with KQL
Stop Drowning in Data: Tame Your Azure Logs with KQL
You’ve probably found yourself in a situation where you have lots of logs coming into your Log Analytics Workspace for Sentinel or Azure…
Vedran Brodar
Jul 7
Exposure Management with CrowdStrike
Exposure Management with CrowdStrike
Vulnerability and asset management merged together to serve and support an organization’s security posture in a greater manner.
Martina Lenić
Jun 28
Inside PC Health Check: Reversing Compatibility Checks — Part 1
Inside PC Health Check: Reversing Compatibility Checks — Part 1
Table of Contents
Hrvoje Filaković
Jun 14
Unlock the Power of Proactive Security: Why You Need Microsoft Sentinel
Unlock the Power of Proactive Security: Why You Need Microsoft Sentinel
If you have different data sources coming in from various types of machines, firewalls, log forwarders, network security groups, etc…
Vedran Brodar
May 17
Proper client communication – storytelling
Proper client communication – storytelling
How to get the job done while nurturing healthy and positive relationship with the client — my experience.
Martina Lenić
May 5
DDoS attacks on your Azure environment? Azure DDoS Protection got you covered
DDoS attacks on your Azure environment? Azure DDoS Protection got you covered
“A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or…
Vedran Brodar
Apr 9
Introduction to Reverse Engineering
Introduction to Reverse Engineering
Table of Contents
Hrvoje Filaković
Mar 26
CrowdStrike — moving EDR/MDR/XDR boundaries and making it worth
CrowdStrike — moving EDR/MDR/XDR boundaries and making it worth
For several years, CrowdStrike has been recognized as a Leader for EDR (Endpoint Detection and Response) and EPP (Endpoint Protection…
Martina Lenić
Feb 14
Defend your Azure environment with Microsoft Defender for Cloud
Defend your Azure environment with Microsoft Defender for Cloud
You have your Azure environment set up and now you are wondering what you can do to protect your deployed resources. Well, I’m here to help…
Vedran Brodar
Jan 24
Want to become Azure Cloud certified? Say no more!
Want to become Azure Cloud certified? Say no more!
In my previous article I wrote about the cybersecurity skill gap and how to fix it. As promised, this article will be more focused on cloud…
Vedran Brodar
Dec 20, 2023
Endpoint Security: EDR/MDR/XDR solutions
Endpoint Security: EDR/MDR/XDR solutions
Differences, capabilities and examples
Martina Lenić
Dec 1, 2023
Cybersecurity skills gap and how to fix it
Cybersecurity skills gap and how to fix it
As security gap in the world of IT becomes more significant each day (reaching about 4 million in 2023 according to CSO and by Fortinet…
Vedran Brodar
Nov 18, 2023
About CyberDnevnik
Latest Stories
Archive
About Medium
Terms
Privacy
Teams