All Posts


Explore every article across identity, security, governance, threat protection, and cloud‑native technologies — all in one unified place.

All Posts

  • Microsoft Sentinel Custom Graphs

    Microsoft Sentinel Custom Graphs – From SIEM to Relationship-Based Security Analytics For a long time, the event- and log-based approach dominated the field of security analysis. SIEM systems were based on this model: data collection, normalization, followed by queries and detections built on tabular structures. This approach still works today, but it has a structural…

    Read more

  • Password Protection in Microsoft Defender – Reducing Identity Risk at the Source

    Most cyberattacks don’t start with some sophisticated exploit. They start with something much simpler: a password. And in many cases, it’s not even hidden—it’s something users have been reusing for years. Not even a clever one either. Usually just a weak, reused, or slightly modified password that’s easy to guess. Even after years of enforcing…

    Read more

  • Microsoft Entra Backup & Recovery Explained

    In today’s cloud environments, identity isn’t just another component, it’s the foundation everything else depends on. Every login, every permission, every access decision flows through systems like Microsoft Entra ID. And that has a very real consequence: when something breaks at the identity layer, it doesn’t stay contained. It spreads fast. Users can’t log in,…

    Read more

  • Identity Is the New Perimeter

    Introduction If you’ve been around enterprise IT for a while, the old security model probably still feels familiar. You had a network you controlled. A data center. Clear boundaries. And most of the security effort went into protecting that edge. Firewalls, VPNs, segmentation, build a strong enough perimeter, and you’re in a good place. And…

    Read more

  • Microsoft Entra Deep Dive

    Identity Security and Zero Trust Access Control Microsoft has developed Microsoft Entra, which is a single and unified identity and network access solution that has been developed to enable the implementation of Zero Trust architectures in cloud and hybrid infrastructures. Zero Trust is a security approach that assumes that no user and no device can…

    Read more