The “assume breach”​ mindset

The “assume breach”​ mindset

How do we react on a data breach? Do we try to limit the damage of a breach once it occurs, do we track down evidence of the who, what, when and where of the breach, do we have a plan that alerts specific security teams, do we execute a remediation plan to recover our...
Pen-testing in Microsoft Azure

Pen-testing in Microsoft Azure

In a series of articles I am planning to write, one of them will be on how to “ethically” pen-test Microsoft Azure architectures. From my experience, it is not that difficult to pen-test but doing it in a sense of respecting the rules of engagement, state...