Layth CHEBBI
  • Home
  • About
  • LinkedIn
  • X
  • Bluesky
  • Github
  • diagram-export-8-18-2024-3_02_29-PM

    Protect against token theft in Microsoft Entra ID

    Architectures
    Layth Chebbi
    August 18, 2024
  • PIM

    Understanding Microsoft Entra Privileged Identity Management (PIM) and Just-In-Time Access

    Architectures
    Layth Chebbi
    August 4, 2024
  • wallhavejn

    Agentless scanning using Microsoft Defender for Cloud

    Defender for Cloud
    Layth Chebbi
    July 28, 2024
  • Azure-Policy -Naming-Prefix

    Azure Policy Anatomy Part 2: Building Custom Policies and Azure Governance

    Governance
    Layth Chebbi
    June 9, 2024
  • Azure Policy Workflow

    Azure Policy Anatomy

    Defender for Cloud
    Layth Chebbi
    May 26, 2024
  • scott-webb-yekGLpc3vro-unsplash

    Understanding MAC Address Changes in Azure: How to Change It and When to Use It

    Compute
    Layth Chebbi
    April 21, 2024
  • wallpaperflare.com_wallpaper (4)

    Is the Cloud Really Secure? Maybe yes maybe not

    Architectures
    Layth Chebbi
    April 7, 2024
  • wallpaperflare.com_wallpaper (3)

    FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users

    Compute
    Layth Chebbi
    March 31, 2024
  • wallpaperflare.com_wallpaper (1)

    Mastering Microsoft Defender for Cloud

    Defender for Cloud
    Layth Chebbi
    March 24, 2024
  • 1_VsPa2K9mZLp83JevGg8xqw

    Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage

    Guides
    Layth Chebbi
    February 4, 2024
Page 2 of 2«12

Most Popular Posts

Most Popular

  • wallpaperflare.com_wallpaper (3)

    FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users

    Layth Chebbi
    March 31, 2024
  • wallpaperflare.com_wallpaper (1)

    Mastering Microsoft Defender for Cloud

    Layth Chebbi
    March 24, 2024
  • Service Groups Architecture Overview

    Azure Service Groups: Finally, Resource Organization That Makes Business Sense

    Layth Chebbi
    September 7, 2025
  • 1_VsPa2K9mZLp83JevGg8xqw

    Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage

    Layth Chebbi
    February 4, 2024

Most Viewed Posts

Most Viewed

  • 91ccfx

    Secure VM Access using Azure Bastion

    Layth Chebbi
    August 25, 2024
  • Service Principal abuse

    Privilege escalation using Azure Service principal

    Layth Chebbi
    September 1, 2024
  • wallpaperflare.com_wallpaper (3)

    FSLogix Hack: Unlock Persistent Profiles in AVD for Cloud only Users

    Layth Chebbi
    March 31, 2024
  • pexels-shkrabaanthony-5475752

    Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database

    Layth Chebbi
    November 2, 2024
  • Security
  • Guides
  • Governance
  • Architectures
  • Infrastructure as a Service
  • Compute
  • Defender for Cloud
  • Entra ID
  • Network
  • Platform as a Service
  • FinOps

© 2026 Layth Chebbi. All Rights Reserved. LinkedIn Contact

© 2026 Layth Chebbi | CyberSecurity Architect