Token Theft Playbook: Proactive Protections
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can…
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can…
Below are all of the latest feature updates coming to Microsoft 365 Automate your Microsoft Security Assessments CloudCapsule is a…
Microsoft is currently in preview with a new session attribute in Conditional Access policies that Requires token protection for sign-ins.…
Today’s article is going to be a little different than usual. While I’ve worked for a few MSPs and actively…
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week…
Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted…
As organizations become more dependent on third-party applications, managing and securing these apps has become increasingly complex. If you’re looking…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
If your organization manages macOS devices, enabling continuous security monitoring is critical—especially with rising threats targeting all endpoints. Microsoft Defender…
Imagine you had a window in your house with a broken lock. Anyone could open it and climb right in.…