Open in app

Sign In

Write

Sign In

Sanna Diana Tomren
Sanna Diana Tomren

26 Followers

Home

About

Dec 15, 2022

Discover internet-exposed assets with Microsoft Defender EASM in Azure

In this article, I will give some context and demonstrate how to kick-start your journey to get a holistic view of your own or others’ internet-exposed assets (known and/or unknown assets) and their vulnerabilities with Microsoft Defender External Attack Surface Management (EASM). EASM service in Microsoft Azure is an effective…

Computer Hacking

6 min read

Discover internet-exposed assets with Microsoft Defender EASM in Azure
Discover internet-exposed assets with Microsoft Defender EASM in Azure
Computer Hacking

6 min read


Sep 8, 2022

Microsoft Most Valuable Professional: more than a trophy? 🏆

The Microsoft MVP Award, is a prestigious award by the leading technology company Microsoft Corporation, signed by CEO — Satya Nadella, and given to technical experts around the globe. The award comes with exclusive access to Microsoft's core product teams. Direct access to Microsoft product teams gives insights into new…

Mvpbuzz

2 min read

Microsoft Most Valuable Professional: more than a trophy? 🏆
Microsoft Most Valuable Professional: more than a trophy? 🏆
Mvpbuzz

2 min read


Apr 22, 2022

Microsoft Community

I am honored to have received the request, trust, and support to establish and organize the Microsoft Security User Group with a great team of talented people. This article will detail the purpose, plan, and resources for this community and how you can engage. Purpose The purpose is to support our…

Microsoft Azure

3 min read

Microsoft Community
Microsoft Community
Microsoft Azure

3 min read


Feb 17, 2022

Cloud, AI, IoT, VR, and 3D printing — all in one hackathon.

Insights into the Arctic Cloud Developer Challenge 2022. In 2021, under Microsoft Most Valuable professional Day, I got challenged by Ulrikke to participate as Judes in the Arctic Cloud Developer Challange (ACDC) for 2022. A challenge I gladly accepted together with Cathrine, Harald, Lasse, and Ahmad.

Cloud Computing

4 min read

Cloud, AI, IoT, VR, and 3D printing — all in one hackathon.
Cloud, AI, IoT, VR, and 3D printing — all in one hackathon.
Cloud Computing

4 min read


Feb 1, 2022

Sustainability on 1.2.3 + technology

I welcome you to a light touch on sustainability and sustainable technology. We will touch upon defining sustainability, the three pillars environmental, social, and governance(ESG), Net-zero, and a carbon-thoughtful technology partner and provider. The United Nations definition of sustainability “..Development that meets today’s needs, without destroying the opportunities for future…

Sustainability

4 min read

Sustainability on 1.2.3 + technology
Sustainability on 1.2.3 + technology
Sustainability

4 min read


Dec 14, 2021

Log4j not so technical

IT-Security experts, administrators and developers have been working around the clock lately due to a critical vulnerability discovered in the popular Java Library Log4j. So I will try to break this down for not-so-technical but interested persons. What is a Library? Today’s software and software development predominately use pre-made libraries to enhance their effectiveness…

Log 4 J

4 min read

Log4j not so technical
Log4j not so technical
Log 4 J

4 min read


Feb 20, 2021

Mobile-apps source code is not a protected asset

It is interesting to see how companies and organizations believe that their mobile application source code is a protected asset. Protected asset due to compiled code files. With just a few tools and technics, it is surprisingly easy to decompile and withdraw a mobile application's source code. NB! These are…

Mobile App Security

2 min read

Do not believe your mobile-app source code is a protected asset
Do not believe your mobile-app source code is a protected asset
Mobile App Security

2 min read


Jan 13, 2021

Cyber Security — coping with Covid-19s effect on organizations digital transformation

Zero Trust (ZT), Endpoint protection (EPP), and Cloud Access Security Broker (CASB) are topics this article will touch upon related to hardening an organization’s security in its modern IT-ecosystem. As a result of global, national, and local regulations, workforces have been moved out of traditional office buildings, networks and into…

Cybersecurity

10 min read

Cyber Security — coping with Covid-19s effect on organizations digital transformation
Cyber Security — coping with Covid-19s effect on organizations digital transformation
Cybersecurity

10 min read


Nov 11, 2020

Cloud-native app development

In today’s application development, it is common to encounter terms like microservices, containers, virtual machines (VMs), orchestrations, and last but not least cloud computing. I will, in corporation with Giridhar Srinivasan, give an introduction to these topics. Microservices In the development of an app for your company, your product, or service…

Cloud Computing

12 min read

Cloud-native app development
Cloud-native app development
Cloud Computing

12 min read


Mar 5, 2020

DevOps, DevSecOps, and DataOps, it is all about the “Ops” in 2020

This article will give you a small introduction to DevOps, DevSecOps, and DataOps.Let’s break the terms down to details: · DevOps = Development and Operations. · DevSecOps = Development, Security, and Operations. · DataOps = Data and Operations. Usually, these terms are associated with approaches to Software Development and IT-Operation…

Dev Ops

4 min read

DevOps, DevSecOps, and DataOps, it is all about the “Ops” in 2020
DevOps, DevSecOps, and DataOps, it is all about the “Ops” in 2020
Dev Ops

4 min read

Sanna Diana Tomren

Sanna Diana Tomren

26 Followers

Passion for technology, from back-end code to leadership

Following
  • Jiadong Chen

    Jiadong Chen

  • Koos Goossens

    Koos Goossens

  • Anders Eide

    Anders Eide

  • CWE/CAPEC

    CWE/CAPEC

  • Ole B. Hansen

    Ole B. Hansen

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech