Jorge Castañeda's Avatar

Jorge Castañeda

@jcastanedacano.bsky.social

Microsoft MVP - Security | Consultant Cloud | Speaker | Board Member de Cloud Security Alliance – Perú | Lider de la comunidad MUG Perú

75 Followers  |  334 Following  |  69 Posts  |  Joined: 21.10.2024
Posts Following

Posts by Jorge Castañeda (@jcastanedacano.bsky.social)

Running Text to Image and Text to Video with ComfyUI and Nvidia H100 GPU

Running Text to Image and Text to Video with ComfyUI and Nvidia H100 GPU

28.02.2026 00:00 — 👍 0    🔁 0    💬 0    📌 0
Top 5 Microsoft Sentinel Queries for Threat Hunting

Top 5 Microsoft Sentinel Queries for Threat Hunting

27.02.2026 20:02 — 👍 0    🔁 0    💬 0    📌 0
Ask Microsoft Anything: Data & AI Security in the Real World

Ask Microsoft Anything: Data & AI Security in the Real World

27.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Top 5 Microsoft Sentinel Queries for Threat Hunting

Top 5 Microsoft Sentinel Queries for Threat Hunting

27.02.2026 16:00 — 👍 0    🔁 0    💬 0    📌 0
Core Collapse

Core Collapse

27.02.2026 00:00 — 👍 0    🔁 0    💬 0    📌 0
Unlocking value with Microsoft Sentinel data lake

Unlocking value with Microsoft Sentinel data lake

26.02.2026 23:00 — 👍 0    🔁 0    💬 0    📌 0
Threat modeling AI applications

Threat modeling AI applications

26.02.2026 19:00 — 👍 0    🔁 0    💬 0    📌 0
Introducing a faster, more intelligent, end-to-end insider risk investigation experience

Introducing a faster, more intelligent, end-to-end insider risk investigation experience

26.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Authorization and Identity Governance Inside AI Agents

Authorization and Identity Governance Inside AI Agents

25.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Build Sensitivity Label‑Aware, Secure RAG with Azure AI Search and Purview

Build Sensitivity Label‑Aware, Secure RAG with Azure AI Search and Purview

24.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Disrupt AWS attacks automatically in Microsoft Sentinel

Disrupt AWS attacks automatically in Microsoft Sentinel

24.02.2026 20:00 — 👍 0    🔁 0    💬 0    📌 0
Developer-targeting campaign using malicious Next.js repositories

Developer-targeting campaign using malicious Next.js repositories

24.02.2026 19:00 — 👍 0    🔁 0    💬 0    📌 0
AI Security in Azure with Microsoft Defender for Cloud: Learn the How, Join the Session

AI Security in Azure with Microsoft Defender for Cloud: Learn the How, Join the Session

24.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Scaling security operations with Microsoft Defender autonomous defense and expert-led services

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

24.02.2026 14:00 — 👍 0    🔁 0    💬 0    📌 0
Introducing the next generation of SOC automation: Sentinel playbook generator

Introducing the next generation of SOC automation: Sentinel playbook generator

23.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Introducing the next generation of SOC automation: Sentinel SOAR playbook generator

Introducing the next generation of SOC automation: Sentinel SOAR playbook generator

23.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Security baseline for Windows Server 2025, version 2602

Security baseline for Windows Server 2025, version 2602

23.02.2026 16:00 — 👍 0    🔁 0    💬 0    📌 0
Managed Identity on SQL Server On-Prem: The End of Stored Secrets

Managed Identity on SQL Server On-Prem: The End of Stored Secrets

23.02.2026 13:00 — 👍 0    🔁 0    💬 0    📌 0
Three ways to run KQL on Microsoft Sentinel data lake: Interactive, Async, or Jobs

Three ways to run KQL on Microsoft Sentinel data lake: Interactive, Async, or Jobs

19.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Running OpenClaw safely: identity, isolation, and runtime risk

Running OpenClaw safely: identity, isolation, and runtime risk

19.02.2026 21:00 — 👍 0    🔁 0    💬 0    📌 0
CCM v4.1 Transition Timeline

CCM v4.1 Transition Timeline

19.02.2026 20:00 — 👍 0    🔁 0    💬 0    📌 0
Accelerate Your UEBA Journey: Introducing the Microsoft Sentinel Behaviors Workbook

Accelerate Your UEBA Journey: Introducing the Microsoft Sentinel Behaviors Workbook

19.02.2026 19:00 — 👍 0    🔁 0    💬 0    📌 0
New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

19.02.2026 18:00 — 👍 0    🔁 0    💬 0    📌 0
Data Quality (DQ) for Standalone Data Assets at Microsoft Purview

Data Quality (DQ) for Standalone Data Assets at Microsoft Purview

19.02.2026 17:00 — 👍 0    🔁 0    💬 0    📌 0
Windows Hello for Business - Registered Methods and Last-used Method

Windows Hello for Business - Registered Methods and Last-used Method

19.02.2026 12:00 — 👍 0    🔁 0    💬 0    📌 0
The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

19.02.2026 09:00 — 👍 0    🔁 0    💬 0    📌 0
Data lake tier Ingestion for Microsoft Defender Advanced Hunting Tables is Now Generally Available

Data lake tier Ingestion for Microsoft Defender Advanced Hunting Tables is Now Generally Available

19.02.2026 08:00 — 👍 0    🔁 0    💬 0    📌 0
General Availability: IP Network Firewalls for Azure Managed HSM

General Availability: IP Network Firewalls for Azure Managed HSM

19.02.2026 07:00 — 👍 0    🔁 0    💬 0    📌 0
AI Security: IAM Delivered at Agent Velocity

AI Security: IAM Delivered at Agent Velocity

19.02.2026 06:00 — 👍 0    🔁 0    💬 0    📌 0
Implementing Azure Lighthouse: A Technical Guide for Service Providers and Enterprises

Implementing Azure Lighthouse: A Technical Guide for Service Providers and Enterprises

19.02.2026 05:00 — 👍 0    🔁 0    💬 0    📌 0