Nino Crudele

The three most effective and dangerous cyberattacks to Azure and countermeasures (part 2 – attack the Azure Storage Service)

Microsoft Azure, a beast forged from the hell of the fabric controller hosted by the Windows Azure kernel operating system, it is solid and...

The three most effective and dangerous cyberattacks to Azure and countermeasures (part 1 – attack all the public and private IP addresses in Azure)

In many years in IT, I learned one important lesson, which is also my first rule: everything and anything is hackable and vulnerable in...

Azure Fundamental for Ethical Hackers and Special Ops Team [free whitepaper]

I spent the last two years of my life leading and supporting a global company in one of the bigger Azure infrastructures in the...

Azure Reconnaissance and Scanning for Ethical Hackers and Special Ops Team [free whitepaper]

The final objective of a Penetration Testing project is to provide useful information to resolve the errors identified before they can be used for...

Cloud vs Datacentre – what you need to know before moving your solution or company into the cloud

Is a datacentre provider cheaper or better than a cloud provider? Speaking without a clue about your solutions, more you are cloud-friendly, and much more...

Popular

Why X3M.AI Exists: Rethinking GRC and Security Execution

There’s a growing disconnect between compliance, risk, and the...

The Importance of Native Security Technologies in a Cloud Security Strategy

It's essential to embrace native security technologies in a...

Enhancing Security Operations with Microsoft’s AI-Powered Security Copilot

Microsoft’s latest innovation, the Security Copilot, is set to...

Do you want to optimize your Log Storage and Costs in Microsoft Sentinel, this is the quick solution.

Optimizing log storage and costs in Microsoft Sentinel is...