Home
About
LinkedIn
X
Bluesky
Github
Azure Service Groups: Finally, Resource Organization That Makes Business Sense
Architectures
Layth Chebbi
September 7, 2025
Calculated Chaos: The Strategic Value of Moving Target Defense in Azure Security
Architectures
Layth Chebbi
April 12, 2025
Denial-of-Wallet Attacks: How Unauthorized Cloud Access Can Empty Your Budget And Ruin Your Life.
FinOps
Layth Chebbi
April 6, 2025
Your Data, Your Rules: Enforcing Privacy with Azure Private Endpoints
Architectures
Layth Chebbi
February 21, 2025
Automating Azure Security: Why DSC Is Your Silent Guardian Against Configuration Drift
Compute
Layth Chebbi
February 16, 2025
Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database
Architectures
Layth Chebbi
November 2, 2024
Defense in Depth in Azure: What You Should Know
Architectures
Layth Chebbi
October 14, 2024
5 Quick Wins to Strengthen the Security of Your Azure Virtual Machines
Guides
Layth Chebbi
September 15, 2024
Privilege escalation using Azure Service principal
Architectures
Layth Chebbi
September 1, 2024
Secure VM Access using Azure Bastion
Compute
Layth Chebbi
August 25, 2024
Page 1 of 2
1
2
ยป
Most Popular Posts
Most Popular
FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users
Layth Chebbi
March 31, 2024
Mastering Microsoft Defender for Cloud
Layth Chebbi
March 24, 2024
Azure Service Groups: Finally, Resource Organization That Makes Business Sense
Layth Chebbi
September 7, 2025
Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage
Layth Chebbi
February 4, 2024
Most Viewed Posts
Most Viewed
Secure VM Access using Azure Bastion
Layth Chebbi
August 25, 2024
FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users
Layth Chebbi
March 31, 2024
Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database
Layth Chebbi
November 2, 2024
Understanding Microsoft Entra Privileged Identity Management (PIM) and Just-In-Time Access
Layth Chebbi
August 4, 2024
Security
Guides
Governance
Architectures
Infrastructure as a Service
Compute
Defender for Cloud
Entra ID
Network
Platform as a Service
FinOps