Fix vulnerabilities with app deployments in Intune
As organizations become more dependent on third-party applications, managing and securing these apps has become increasingly complex. If you’re looking…
What’s New in Microsoft 365 | April Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Enroll Mac devices into Defender | Use these steps
If your organization manages macOS devices, enabling continuous security monitoring is critical—especially with rising threats targeting all endpoints. Microsoft Defender…
Finding Vulnerabilities on Devices | Use these steps!
Imagine you had a window in your house with a broken lock. Anyone could open it and climb right in.…
Find risky apps in Microsoft 365
If you’ve ever used your Microsoft 365 credentials to log in to a third-party app or set up a workflow…
What’s New in Microsoft 365 | March Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Automating Vendor Onboarding Request
Are you looking to streamline vendor onboarding requests in your organization? In this post, I’ll walk you through an end-to-end…
Application Inventory Management | Use these templates
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of…
Secure Application Management | Getting Started
How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like…
What’s New in Microsoft 365 | February Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…