Finding Vulnerabilities on Devices | Use these steps!
Imagine you had a window in your house with a broken lock. Anyone could open it and climb right in.…
Find risky apps in Microsoft 365
If you’ve ever used your Microsoft 365 credentials to log in to a third-party app or set up a workflow…
What’s New in Microsoft 365 | March Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Automating Vendor Onboarding Request
Are you looking to streamline vendor onboarding requests in your organization? In this post, I’ll walk you through an end-to-end…
Application Inventory Management | Use these templates
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of…
Secure Application Management | Getting Started
How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like…
What’s New in Microsoft 365 | February Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Getting Started with AI Agents in Microsoft 365 | Tutorial
AI agents are one of the hottest topics in technology today. If you’re looking to gain hands-on experience but don’t…
Understanding AI Agents | Future of SaaS
AI agents are one of the hottest topics in technology today. Whether you’re deeply involved in the tech industry or…
How to Retain Sign-In Logs in Entra Beyond 30 Days
In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and…