Advertisement · 728 × 90

Posts by Layth Chebbi

Preview
PIM Manager - Chrome Web Store Manage Azure Entra ID Privileged Identity Management roles

Just shipped PIM Manager a Chrome extension for Microsoft Entra ID PIM users 🛡️

Activate privileged roles in one click instead of navigating the Azure Portal every time.

Would really appreciate any feedback or suggestions! Give it a try:
chromewebstore.google.com/detail/pim-m...

2 months ago 1 1 0 0
Preview
PIM Manager - Chrome Web Store Manage Azure Entra ID Privileged Identity Management roles

Just shipped PIM Manager a Chrome extension for Microsoft Entra ID PIM users 🛡️

Activate privileged roles in one click instead of navigating the Azure Portal every time.

Would really appreciate any feedback or suggestions! Give it a try:
chromewebstore.google.com/detail/pim-m...

2 months ago 1 1 0 0
Preview
Claude now available in Microsoft 365 Copilot Claude models are now available in Microsoft 365 Copilot, bringing Claude to millions of enterprise users through Microsoft's productivity platform.

Claude Sonnet 4 and Opus 4.1 are now available in Microsoft 365 Copilot, bringing Claude’s advanced reasoning capabilities to millions of enterprise users.

www.anthropic.com/news/claude-...

6 months ago 0 0 0 0
Preview
Azure Service Groups: Finally, Resource Organization That Makes Business Sense - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews Service Groups Architecture Overview Service Groups Deep Dive Infrastructure Perspective Definition and PurposeAzure Service Groups ...

After years of wrestling with Azure's rigid subscription hierarchy, I'm genuinely excited about Service Groups.
Wrote up a practical guide with PowerShell labs that you can run in 30 minutes.
#AzureServiceGroups #CloudGovernance #Azure #ResourceGroups #Microsoft
laythchebbi.com/2647-2/

7 months ago 2 0 0 0

The ironic tragedy is life has to be lived forward but only makes sense in reverse

10 months ago 4 0 0 0
Preview
Calculated Chaos: The Strategic Value of Moving Target Defense in Azure Security - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews 1. Introduction Cybersecurity for cloud environments has traditionally relied on static defenses firewalls, access controls, and per...

Just published a new article exploring how Moving Target Defense (MTD) can significantly enhance cloud security in Microsoft Azure. Learn how dynamic strategies can disrupt attackers and build a more resilient environment.
laythchebbi.com/calculated-c...
#CloudSecurity #Cybersecurity #mtd

1 year ago 7 0 0 0
Preview
Denial-of-Wallet Attacks: How Unauthorized Cloud Access Can Empty Your Budget And Ruin Your Life. - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews Introduction Storage services like Microsoft Azure Storage Accounts and Amazon S3 buckets offer scalability, durability, and ease of...

My New article: "Denial-of-Wallet Attacks" reveals how unauthorized API calls to Azure and AWS can drain your budget with runaway bills.
Learn how to protect your cloud spending.
Read more: laythchebbi.com/denial-of-wa...
#CloudSecurity #AWS #Azure #DenialOfWallet #CloudBilling

1 year ago 2 0 0 0
Post image

I've successfully renewed my Microsoft Certified: Cybersecurity Architect Expert certification. The renewal process was a nice refresher on advanced security architectures and cloud protection strategies. #MicrosoftCertified #Cybersecurity #sc100

1 year ago 3 0 0 0
Post image
1 year ago 3 0 0 0
Advertisement
Preview
Your Data, Your Rules: Enforcing Privacy with Azure Private Endpoints - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews Introduction When your data travels over the public internet, it’s exposed to risks—interception, breaches, and unauthorized access....

🔒 Keep cloud data OFF the public internet! Azure Private Endpoints use private IPs only. This guide breaks down:
✅ Why they’re essential
✅ How they work
✅ Quick setup steps
Secure your flow! 👇
laythchebbi.com/your-data-yo...
#CloudSecurity #AzureTips #DataPrivacy

1 year ago 1 0 0 0
Preview
Automating Azure Security: Why DSC Is Your Silent Guardian Against Configuration Drift Introduction Many organizations today overlook the critical role of Desired State Configuration (DSC) in safeguarding cloud infrastructure, often underestimating its ability to prevent misconfiguratio...

Configuration drift leaving your Azure vulnerable?
My new article explores how Azure DSC automates security & enforces policies! 🛡️
laythchebbi.com/index.php/20...
#Azure #DSC #Security #ConfigurationManagement

1 year ago 3 1 0 0
Preview
AWS Certified Cloud Practitioner was issued by Amazon Web Services Training and Certification to Layth Chebbi. Earners of this certification have a fundamental understanding of IT services and their uses in the AWS Cloud. They demonstrated cloud fluency and foundational AWS knowledge. Badge owners are able to ...

🌟 Excited to Share a Milestone! 🌟
I’m thrilled to announce I’ve passed the AWS Cloud Practitioner exam! 🎉 Coming from a strong Microsoft Azure background, this is my first step into
@awscloud.bsky.social credly.com/badges/c4236... via @credly

1 year ago 3 0 0 0
Post image
1 year ago 5 0 0 0
Post image

I'm excited to kick off the new year by renewing my Microsoft Azure Security Engineer Certification! 💪🔒

#AzureSecurity #CloudSecurity #MicrosoftCertified #Cybersecurity #Azure

1 year ago 2 0 0 0

Thanks!

1 year ago 0 0 0 0
Post image Post image Post image


Check out my Azure workbook, "Storage Account Security Posture" on GitHub github.com/laythchebbi/...
It provides an overview of security configurations for storage accounts in your Azure environment.
#azure #security #workbook #microsoft #storageaccount

1 year ago 13 2 1 0
Preview
Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage Introduction Cloud computing has become increasingly popular among enterprises, corporations, and individuals, providing an easy way to deploy projects without the need for infrastructure maintenance,...

Ever wondered how attackers exploit misconfigured Azure environments? I've created a step-by-step lab to show exactly how breaches happen and how to prevent them!
Read now 👉 laythchebbi.com/index.php/20...
#azure #cloudcecurity #microsoft #cyberchreats #cyberSecurity #datasecurity #infosec

1 year ago 7 3 0 0
Preview
Effortless Email Archiving Saving Sent Emails on Server with Laravel IMAP Effortlessly archive sent emails on your server with Laravel IMAP. Seamlessly integrate email archiving into your Laravel app to keep sent emails secure and easily accessible.

Archive Sent Emails on Laravel easily.
#php #laravel #imap
koossaayy.tn/effortless-e...

1 year ago 2 1 0 0
Preview
Privilege escalation using Azure Service principal Introduction In Microsoft Azure, the management of access and permissions is critical for maintaining a secure environment. Azure Service Principals serve as non-human identities that allow applicatio...

In this blog post i breaks down how attackers can exploit and abuse service principals and what you can do to defend against it.
Check it out here:
laythchebbi.com/index.php/20...
#AzureSecurity #PrivilegeEscalation #OffensiveSecurity #CloudSecurity #Cybersecurity

1 year ago 23 9 0 0
Advertisement

Thanks! 🙏

1 year ago 0 0 0 0

Thrilled to see my article on Protecting Against Token Theft in Microsoft Entra ID featured in this week’s Entra ID Newsletter by @merill.net ! 🎉
If you’re into identity security, don’t miss it. 🛡️ Check out the latest edition
Big thanks to Merill for including my work! 🙌

1 year ago 7 1 0 0
Preview
Azure Policy Anatomy What is Azure Policy Azure Policy is a service in Microsoft Azure that enforces organizational standards and evaluates compliance at scale. It allows users to create, assign, and manage policies to en...

If you want to learn about Azure Policy, understand its functionality, and how it can benefit you in terms of security governance or financially, check out this article
laythchebbi.com/index.php/20...
#microsoft #azure #azurepolicy #security 🌐📷

1 year ago 9 3 0 0
Preview
7 things to know about Bluesky before you join - and why you should It's not a direct replacement for Twitter (X), but Bluesky has a lot to offer those who want a fresh start in a decentralized, privacy-minded network.

This article talks about their monetization plans and future plans
www.zdnet.com/article/7-th...

1 year ago 1 0 0 0


Thanks!
Yes, token protection in Microsoft Entra ID applies to devices managed through Intune Mobile Device Management (MDM).

1 year ago 0 0 0 0

The supported apps include Microsoft 365 apps (e.g., Word, Excel, and Outlook), as well as Exchange Online for scenarios involving app logins. You’re correct that these apps are not perpetual but subscription-based, and they are indeed supported as part of Microsoft 365.

1 year ago 1 0 0 0
Preview
Protect against token theft in Microsoft Entra ID How Token Generation and Authentication Work? Token generation and authentication in Entra ID involve a sophisticated process designed to secure user identities and control access to resources. Unders...

In this article, I explore the vital aspects of token generation and authentication within Microsoft Entra ID.
laythchebbi.com/index.php/20...
#Cybersecurity #CloudSecurity #EntraID #TokenProtection #MFA #Authentication #InfoSec

1 year ago 66 8 2 0
Post image

Microsoft PowerToys just got a whole lot more powerful! 🚀
Introducing New+, the latest feature that lets you create files and folders from your favorite templates right from the File Explorer context menu. 🤯
learn.microsoft.com/en-us/window...
#PowerToys #New+ #Productivity #Windows #Microsoft #Tech

1 year ago 8 2 0 0
Advertisement
Preview
Secure VM Access using Azure Bastion Introduction In the cloud, security is a top priority. While Azure Virtual Machines (VMs) offer scalable and flexible computing power, improper configuration—especially when exposing VMs directly to t...

🔒Just published: How to Secure Azure VMs Using Azure Bastion! 🚀 Discover the risks of exposing VMs to the internet and how Bastion keeps them safe. Don’t leave your cloud vulnerable—get the details here: laythchebbi.com/index.php/20...
#Azure #CloudSecurity #AzureBastion #CyberSecurity

1 year ago 0 0 0 0
Preview
Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database Introduction With data breaches making headlines almost every day, organizations are increasingly prioritizing data security, especially for sensitive information. In cloud databases like Azure SQL Da...

Just published a new blog post 🎉
Learn how Dynamic Data Masking (DDM) in Azure SQL helps limit data exposure for non-privileged users.
laythchebbi.com/index.php/20...
#AzureSQL #DataSecurity #DynamicDataMasking #CloudSecurity

1 year ago 0 1 0 0