Skip to content
Collection of notes
Collection of notes
  • Privacy Policy
  • Who Am I?
Shuffle

Tag: azure

News

Microsoft Azure Flaw: An In-Depth Analysis and Response

  • By suryo utomo
  • August 6, 2023
  • 0 comments
cloud hacking
1 min read

Recently, a security flaw was discovered in Microsoft’s Power Platform Custom Connectors feature that allowed unauthenticated attackers to access cross-tenant applications and sensitive data, including [Read More…]

Tagged analysis, azure, reportLeave a Comment on Microsoft Azure Flaw: An In-Depth Analysis and Response
  • Implementing Passwordless Authentication in a Global Hybrid Enterprise Part 1
  • Why Central Banks Need to Care About Post-Quantum Cryptography
  • LLMs in Cybersecurity: Opportunities and Challenges
  • The Truth About Public Wi-Fi: Is It Really Safe?
  • SABSA Implementation in E-Commerce: A Strategic Security Architecture Perspective

Recent Posts

  • Implementing Passwordless Authentication in a Global Hybrid Enterprise Part 1
  • Why Central Banks Need to Care About Post-Quantum Cryptography
  • LLMs in Cybersecurity: Opportunities and Challenges
  • The Truth About Public Wi-Fi: Is It Really Safe?
  • SABSA Implementation in E-Commerce: A Strategic Security Architecture Perspective

Categories

  • News
  • Opinion
  • Paper
  • Random

You May Also Like:

Implementing Passwordless Authentication in a Global Hybrid Enterprise Part 1
Opinion

Implementing Passwordless Authentication in a Global Hybrid Enterprise Part 1

Posted on May 18, 2025 by suryo utomo
Why Central Banks Need to Care About Post-Quantum Cryptography
Opinion

Why Central Banks Need to Care About Post-Quantum Cryptography

Posted on March 1, 2025March 1, 2025 by suryo utomo
LLMs in Cybersecurity: Opportunities and Challenges
Paper

LLMs in Cybersecurity: Opportunities and Challenges

Posted on January 27, 2025January 27, 2025 by suryo utomo
The Truth About Public Wi-Fi: Is It Really Safe?
Opinion

The Truth About Public Wi-Fi: Is It Really Safe?

Posted on December 1, 2024 by suryo utomo
SABSA Implementation in E-Commerce: A Strategic Security Architecture Perspective
Opinion

SABSA Implementation in E-Commerce: A Strategic Security Architecture Perspective

Posted on November 9, 2024 by suryo utomo
Protecting Your Business: Why Third-Party Risk Management is Crucial for Cybersecurity
Opinion

Protecting Your Business: Why Third-Party Risk Management is Crucial for Cybersecurity

Posted on September 28, 2024September 28, 2024 by suryo utomo
CrowdStrike’s BSOD Incident: A Lesson in Cybersecurity Update Management
News

CrowdStrike’s BSOD Incident: A Lesson in Cybersecurity Update Management

Posted on August 18, 2024August 18, 2024 by suryo utomo
How to Handle a Ransomware Attack Indonesian Style: No Backup, No Plan, No Problem!
Opinion

How to Handle a Ransomware Attack Indonesian Style: No Backup, No Plan, No Problem!

Posted on June 30, 2024June 30, 2024 by suryo utomo
Collection of notes
Notes and any other my interesting stuff
Scroll to top
  • Privacy Policy
  • Who Am I?