Find risky apps in Microsoft 365
If you’ve ever used your Microsoft 365 credentials to log in to a third-party app or set up a workflow…
If you’ve ever used your Microsoft 365 credentials to log in to a third-party app or set up a workflow…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Are you looking to streamline vendor onboarding requests in your organization? In this post, I’ll walk you through an end-to-end…
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of…
How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
AI agents are one of the hottest topics in technology today. If you’re looking to gain hands-on experience but don’t…
AI agents are one of the hottest topics in technology today. Whether you’re deeply involved in the tech industry or…
In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…