



Proactive vs. Reactive Security in Microsoft Azure
Jan 31, 2025
•
NetSPI

Azure Cloud Security Pentesting Skills
Aug 28, 2023
•
Karl Fosaaen, NetSPI

Azure Security Fundamentals – Level 200
May 29, 2022
•
Purple

Confidential Computing in Azure Explained
May 28, 2022
•
Intel Corporation

Azure Cloud Security Architecture
May 25, 2022
•
AllScripts

Azure Security Fundamentals – Level 1
May 19, 2022
•
ExamPro

Finding Security Holes in Azure Services
May 15, 2022
•
Orca

Azure Kubernetes Service (AKS) Security Explained
May 7, 2022
•
KSOC

Azure Security Fundamentals – Zero Trust with Azure AD
May 1, 2022
•
Celidor

Azure Security Best Practices for Cloud Architects
Mar 21, 2021
•
John Savill

HOW TO PREPARE FOR GDPR IN AZURE CLOUD ENVIRONMENT
Nov 1, 2020
•
energage

WHAT IS AZURE IDENTITY MANAGEMENT?
Sep 6, 2020
•
Argos

HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE?
Aug 16, 2020
•
EITR Technologies

Threat Intelligence in Azure
Feb 23, 2020
•
Microsoft

Microsoft Ignite 2020 Sydney – Security Releases
Feb 16, 2020
•
Argos Security

AZURE vs AWS from a cybersecurity lens
Jan 19, 2020
•