Layth CHEBBI
  • Home
  • About
  • LinkedIn
  • X
  • Github
  • Mastodon

  • Calculated Chaos: The Strategic Value of Moving Target Defense in Azure Security

    1

    1. Introduction Cybersecurity for cloud environments has traditionally relied on static defenses firewalls, access controls, and periodic ..

    Architectures
    Layth Chebbi
    April 12, 2025

Featured Posts

  • 2
    A cracked digital wallet leaking coins and error codes like '403' and '401' into a neon-lit, futuristic cloud network with data streams and circuit patterns in the background.

    Denial-of-Wallet Attacks: How Unauthorized Cloud Access Can Empty Your Budget And Ruin Your Life.

    Layth Chebbi
    April 6, 2025
  • 3
    Private Endpoint vs Public Endpoint

    Your Data, Your Rules: Enforcing Privacy with Azure Private Endpoints

    Layth Chebbi
    February 21, 2025
  • 4

    Automating Azure Security: Why DSC Is Your Silent Guardian Against Configuration Drift

    Layth Chebbi
    February 16, 2025
  • 5

    Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database

    Layth Chebbi
    November 2, 2024
  • Understanding Microsoft Entra Privileged Identity Management (PIM) and Just-In-Time Access

    Introduction Microsoft Entra Privileged Identity Management (PIM) is a feature of Microsoft Entra ID that enables organizations to manage, ..

    Architectures
    Layth Chebbi
    August 4, 2024
  • Agentless scanning using Microsoft Defender for Cloud

    Introduction To fully grasp the concept of agentless scanning in Microsoft Defender for Cloud, it’s essential to delve into a few key questions ..

    Defender for Cloud
    Layth Chebbi
    July 28, 2024
  • Azure Policy Anatomy Part 2: Building Custom Policies and Azure Governance

    Introduction Now that we understand what Azure Policy is, and we’ve previously used a built-in policy to deploy resources to a specific ..

    Governance
    Layth Chebbi
    June 9, 2024
  • Azure Policy Anatomy

    What is Azure Policy Azure Policy is a service in Microsoft Azure that enforces organizational standards and evaluates compliance at scale. ..

    Defender for Cloud
    Layth Chebbi
    May 26, 2024
  • Understanding MAC Address Changes in Azure: How to Change It and When to Use It

    This Blog post will show you how to change mac address in azure vm permanently.

    Compute
    Layth Chebbi
    April 21, 2024
  • Is the Cloud Really Secure? Maybe yes maybe not

    Introduction When it comes to cloud security, one cannot help but ponder: Is the cloud truly secure? Is it not secure at all? Or perhaps, ..

    Architectures
    Layth Chebbi
    April 7, 2024
  • FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users

    FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users

    Compute
    Layth Chebbi
    March 31, 2024
  • Mastering Microsoft Defender for Cloud

    Introduction In this blog series, we will delve into Microsoft Defender for Cloud. We’ll cover what it is and how it works, explore ..

    Defender for Cloud
    Layth Chebbi
    March 24, 2024
  • Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage

    Introduction Cloud computing has become increasingly popular among enterprises, corporations, and individuals, providing an easy way to deploy ..

    Guides
    Layth Chebbi
    February 4, 2024

End of content

No more posts to load

Load More

Most Popular Posts

Most Popular

  • Mastering Microsoft Defender for Cloud

    Layth Chebbi
    March 24, 2024
  • Calculated Chaos: The Strategic Value of Moving Target Defense in Azure Security

    Layth Chebbi
    April 12, 2025
  • Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage

    Layth Chebbi
    February 4, 2024
  • A cracked digital wallet leaking coins and error codes like '403' and '401' into a neon-lit, futuristic cloud network with data streams and circuit patterns in the background.

    Denial-of-Wallet Attacks: How Unauthorized Cloud Access Can Empty Your Budget And Ruin Your Life.

    Layth Chebbi
    April 6, 2025

Most Viewed Posts

Most Viewed

  • Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database

    Layth Chebbi
    November 2, 2024
  • FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users

    Layth Chebbi
    March 31, 2024
  • Protect against token theft in Microsoft Entra ID

    Layth Chebbi
    August 18, 2024
  • Understanding Microsoft Entra Privileged Identity Management (PIM) and Just-In-Time Access

    Layth Chebbi
    August 4, 2024
  • Security
  • Guides
  • Governance
  • Architectures
  • Infrastructure as a Service
  • Compute
  • Defender for Cloud
  • Entra ID
  • Network
  • Platform as a Service
  • FinOps

© 2025 Layth CHEBBI´s Blog.