Introduction What is the first vector a threat actor is going to use to get into your environment? Email. Better protect your users and cloud collaboration platforms from the latest
Introduction What is the first vector a threat actor is going to use to get into your environment? Email. Better protect your users and cloud collaboration platforms from the latest
Lots of time ago I wrote a post about securing the HTTP triggered workflows created with Power Automate. You can read this post here. When you create a workflow with
The “When an HTTP request is received” trigger is one of my favourite building blocks for creating serverless processes with low-code workflows technologies like Power Automate or Azure Logic Apps
I recently helped a client secure the connection for the Web Services for Microsoft Dynamics GP. I sent over the prerequisites for ports, certificates and so on in advance. When
How do you make sure your Azure Edge devices are secure and cannot be tampered with? This is the job of the Azure IoT Edge Security Manager. More information can