Advertisement · 728 × 90

Posts by Jorge Castañeda

Introducing the New Microsoft Security Community Home!

Introducing the New Microsoft Security Community Home!

15 minutes ago 0 0 0 0
Detection strategies across cloud and identities against infiltrating IT workers

Detection strategies across cloud and identities against infiltrating IT workers

2 hours ago 0 0 0 0
Strengthening Identity Resilience: A Deep Dive into Microsoft Entra Backup and Recovery

Strengthening Identity Resilience: A Deep Dive into Microsoft Entra Backup and Recovery

4 hours ago 0 0 0 0
New Cloud Security Alliance Survey Reveals 82% of Enterprises Have Unknown AI Agents in Their Environments

New Cloud Security Alliance Survey Reveals 82% of Enterprises Have Unknown AI Agents in Their Environments

5 hours ago 0 0 0 0
Making opportunistic cyberattacks harder by design

Making opportunistic cyberattacks harder by design

23 hours ago 0 0 0 0
Why UK Enterprise Cybersecurity Is Failing in 2026 (And What Leaders Must Change)

Why UK Enterprise Cybersecurity Is Failing in 2026 (And What Leaders Must Change)

1 day ago 0 0 0 0
Running multimedia AI models on Container Apps with Serverless GPU (A100 & T4)

Running multimedia AI models on Container Apps with Serverless GPU (A100 & T4)

1 day ago 0 0 0 0
Detecting Plain‑Text Password Exposure Using Custom Regex in Microsoft Purview

Detecting Plain‑Text Password Exposure Using Custom Regex in Microsoft Purview

1 day ago 0 0 0 0
Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

2 days ago 0 0 0 0
Advertisement
Containing a domain compromise: How predictive shielding shut down lateral movement

Containing a domain compromise: How predictive shielding shut down lateral movement

4 days ago 0 0 0 0
Maintaining Azure Public IP Inventory by Retrieving Exact Deleted Public IP Using Activity Logs

Maintaining Azure Public IP Inventory by Retrieving Exact Deleted Public IP Using Activity Logs

4 days ago 0 0 0 0
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

5 days ago 0 0 0 0
Building your cryptographic inventory: A customer strategy for cryptographic posture management

Building your cryptographic inventory: A customer strategy for cryptographic posture management

5 days ago 0 0 0 0
More Than Half of Organizations Experience AI Agent Scope Violations, Cloud Security Alliance Study Finds

More Than Half of Organizations Experience AI Agent Scope Violations, Cloud Security Alliance Study Finds

5 days ago 1 0 0 0
Hunting Infostealers - Trusted Platform Abuse

Hunting Infostealers - Trusted Platform Abuse

5 days ago 0 0 0 0
Enforce Cost Limits on KQL Queries and Notebooks in the Microsoft Sentinel Data Lake

Enforce Cost Limits on KQL Queries and Notebooks in the Microsoft Sentinel Data Lake

5 days ago 0 0 0 0
Advertisement
Enterprise Cybersecurity in the Age of AI: Why Legacy Security Is Failing as Attackers Move Faster

Enterprise Cybersecurity in the Age of AI: Why Legacy Security Is Failing as Attackers Move Faster

5 days ago 0 0 0 0
When the shield becomes the sword: How misconfigured PAM bridges the tiering model

When the shield becomes the sword: How misconfigured PAM bridges the tiering model

6 days ago 0 0 0 0
Security Community Spotlight: Fabrício Assumpção

Security Community Spotlight: Fabrício Assumpção

6 days ago 1 0 0 0
Incident response for AI: Same fire, different fuel

Incident response for AI: Same fire, different fuel

6 days ago 0 0 0 0
What’s new in Microsoft Entra – March 2026

What’s new in Microsoft Entra – March 2026

6 days ago 0 0 0 0
Credential Exposure Risk & Response Workbook

Credential Exposure Risk & Response Workbook

6 days ago 0 0 0 0
Running KQL queries on Microsoft Sentinel data lake using API

Running KQL queries on Microsoft Sentinel data lake using API

1 week ago 0 0 0 0
Microsoft Sentinel data federation: Expand visibility while preserving governance

Microsoft Sentinel data federation: Expand visibility while preserving governance

1 week ago 0 0 0 0
SANS Institute, Cloud Security Alliance, [un]prompted, and OWASP GenAI Security Project Release Emergency Strategy Briefing as AI-Driven Vulnerability Discovery Compresses Exploit Timelines from Weeks to Hours

SANS Institute, Cloud Security Alliance, [un]prompted, and OWASP GenAI Security Project Release Emergency Strategy Briefing as AI-Driven Vulnerability Discovery Compresses Exploit Timelines from Weeks to Hours

1 week ago 0 0 0 0
Azure Key Vault HSM Platform One Retirement: What Purview BYOK Customers Need to Know

Azure Key Vault HSM Platform One Retirement: What Purview BYOK Customers Need to Know

1 week ago 1 1 0 0
Advertisement
Why External Users Can’t Open Encrypted Attachments in Certain Conditions & How to Fix It Securely

Why External Users Can’t Open Encrypted Attachments in Certain Conditions & How to Fix It Securely

1 week ago 0 0 0 0
Announcing Public Preview: Security Copilot’s Email Summary in Microsoft Defender

Announcing Public Preview: Security Copilot’s Email Summary in Microsoft Defender

1 week ago 0 0 0 0
Microsoft Defender for Endpoint (MDE) — Custom Role Design for Troubleshooting Mode–Only Access

Microsoft Defender for Endpoint (MDE) — Custom Role Design for Troubleshooting Mode–Only Access

1 week ago 0 0 0 0
Customer Offerings: Hyper-V - Implementation, Migration, and Management

Customer Offerings: Hyper-V - Implementation, Migration, and Management

1 week ago 0 0 0 0