PinnedJad KarakiGenerative AI: Shifting the Paradigm with Copilot for SecurityIn the first article of the Generative AI series, we deep dived into the world of Generative AI & LLMs and explored strategies for securing…·6 min read·Mar 17, 2024----
PinnedJad KarakiSecuring Generative AI: Preparing for Microsoft 365 CopilotIn a world where Artificial Intelligence has transitioned from being a distant idea to a fundamental component of our daily lives…·7 min read·Oct 19, 2023----
PinnedJad KarakiZero Trust: A Layered Approach to Privileged Access ManagementHow Azure AD and other components of the Microsoft 365 Security ecosystem can be leveraged to implement a least priviliged approach·1 min read·Jul 12, 2023----
PinnedJad KarakiZero Trust — A Layered Approach against cyber threats — Part IIThis article will serve as a follow up to the Zero Trust primer ‘Zero Trust — An Introduction’. In this second part of the series, we’ll…·7 min read·Jun 20, 2022----
Jad KarakiZero Trust ─ Part III: Mitigating Emerging and Black Swan RisksThis article will be the third instalment in the Zero Trust series and serves as a follow up to the ‘Zero Trust ─ Part I: Introduction’ and…·6 min read·Jul 14, 2023----
Jad KarakiMicrosoft Sentinel — Architecture DiagramHere’s a high-level diagram that illustrates Microsoft Sentinel’s architecture and how it integrates with the wider Microsoft ecosystem…·1 min read·Jul 4, 2023----
Jad KarakiCloud Security Management: CSPM vs. CWPP vs. CIEM vs. CNAPPIf you’re an IT professional trying to figure out how to integrate security into your cloud workloads, you’ve most definitely come across…·6 min read·Apr 24, 2023----
Jad KarakiThe Microsoft 365 Zero Trust Mind MapFor the last few months, I’ve been deep diving into Zero Trust and I have been working towards making this new and challenging topic easier…·2 min read·Aug 24, 2022----