What’s New in Microsoft 365 | July Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls CloudCapsule is a tool I’ve been working on over the…
Getting Started with Risky Users in Microsoft 365
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a new risky user.…
Token Theft: Disrupt the Kill Chain
I recently did a webinar on Token theft where I broke down one of the fastest growing attacks: Token theft via AiTM phishing. In this article, I will summarize that…
Agilitec’s Evolution: From MSP to High Touch Consultancy
In this weeks article of T-Minus365, I sat down with Allan and Brian from Agilitec IT, a forward-thinking MSP based in Las Vegas (and recent winners of the Pax8 Partner…
What’s New in Microsoft 365 | June Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls CloudCapsule is a tool I’ve been working on over the…
Essential 8 with Microsoft 365
In this post, we’ll explore how the Australian Cyber Security Centre’s Essential Eight framework maps directly to Microsoft 365 security controls—and how you can automate evidence collection and policy checks…
Token Theft Playbook: Proactive Protections
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC incidents as well. Today’s deep dive…
What’s New in Microsoft 365 | May Updates
Below are all of the latest feature updates coming to Microsoft 365 Automate your Microsoft Security Assessments CloudCapsule is a tool I’ve been working on over the past year that…
Breaking Down Token Protection In Conditional Access
Microsoft is currently in preview with a new session attribute in Conditional Access policies that Requires token protection for sign-ins. Full Details: Microsoft Entra Conditional Access token protection explained –…
Building a Security-Focused Managed Service Model | GCS Technologies
Today’s article is going to be a little different than usual. While I’ve worked for a few MSPs and actively consult on a weekly basis, I think its important to…



