Skip to content
CLOUD | SECURITY | COMPLIANCE
  • Consulting
  • Services
  • Training
  • Resources
  • About Us
  • Contact Us

Security

  1. Home>
  2. Security
Read more about the article Mitigate Top 5 Microsoft Active Directory Vulnerabilities with Built-In feature of Active Directory & Entra ID

Mitigate Top 5 Microsoft Active Directory Vulnerabilities with Built-In feature of Active Directory & Entra ID

  • Post author:Sameer Sawant
  • Post published:January 25, 2025
  • Post category:Security
  • Post comments:0 Comments

As application developers start using Docker and Kubernetes to manage containers, get to know what security you can implement with this article.

Continue ReadingMitigate Top 5 Microsoft Active Directory Vulnerabilities with Built-In feature of Active Directory & Entra ID
Read more about the article Security Best Practices for Dockers and Kubernetes environment

Security Best Practices for Dockers and Kubernetes environment

  • Post author:Sameer Sawant
  • Post published:May 12, 2024
  • Post category:Security
  • Post comments:0 Comments

As application developers start using Docker and Kubernetes to manage containers, get to know what security you can implement with this article.

Continue ReadingSecurity Best Practices for Dockers and Kubernetes environment
Read more about the article Keep threats away by controlling Shadow IT
Shadow IT

Keep threats away by controlling Shadow IT

  • Post author:Sameer Sawant
  • Post published:June 1, 2023
  • Post category:Security
  • Post comments:0 Comments

​ In today's fast-paced digital landscape, technology plays a pivotal role in the success of organizations. While the IT department strives to maintain control over the technological infrastructure, a parallel…

Continue ReadingKeep threats away by controlling Shadow IT
Read more about the article Importance of zero trust model in cybersecurity

Importance of zero trust model in cybersecurity

  • Post author:Sameer Sawant
  • Post published:January 2, 2023
  • Post category:Security
  • Post comments:0 Comments

​COVID-19 taught all businesses that it’s not going to be all wonderful & smooth and we need to adjust very quickly in any situation to survive. In 2020, the global…

Continue ReadingImportance of zero trust model in cybersecurity

Recent Posts

  • Mitigate Top 5 Microsoft Active Directory Vulnerabilities with Built-In feature of Active Directory & Entra ID
  • Security Best Practices for Dockers and Kubernetes environment
  • Keep threats away by controlling Shadow IT
  • Importance of zero trust model in cybersecurity
  • Fundamentals of Robotic Process Automation

Recent Comments

    Archives

    • January 2025
    • May 2024
    • June 2023
    • January 2023
    • October 2022

    Categories

    • Automation
    • Security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Garius

    • Cookie Policy
    • Privacy Policy
    • Sitemap
    • About Us
    • Contact Us

    HOME

    • Consulting
    • Services
    • Training
    • Resources

    Resources

    • Blogs
    • Insights
    • Partnerships

    Office

    C/209, Hiral Green society,  Mira Road (E), Thane – 401107

    Email: sameer.sawant@garius.in

    Copyright © 2023 Garius Technology Solutions

    Close Menu
    This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT