Token Theft Playbook: Incident Response
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved this…
Deploy Attack Surface Reduction Rules from Microsoft Intune
Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved you from disaster? It could…
Fix vulnerabilities with app deployments in Intune
As organizations become more dependent on third-party applications, managing and securing these apps has become increasingly complex. If you’re looking for a streamlined solution to manage and update these applications,…
What’s New in Microsoft 365 | April Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls CloudCapsule is a tool I built that automates your M365…
Enroll Mac devices into Defender | Use these steps
If your organization manages macOS devices, enabling continuous security monitoring is critical—especially with rising threats targeting all endpoints. Microsoft Defender for Endpoint provides 24/7 active vulnerability scanning for macOS, but…
Finding Vulnerabilities on Devices | Use these steps!
Imagine you had a window in your house with a broken lock. Anyone could open it and climb right in. Now imagine your neighbor posts about it on Next Door…
Find risky apps in Microsoft 365
If you’ve ever used your Microsoft 365 credentials to log in to a third-party app or set up a workflow integration, then congratulations — you’ve interacted with an OAuth application.…
What’s New in Microsoft 365 | March Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls I am excited to announce the soft-launch of an automated…
Automating Vendor Onboarding Request
Are you looking to streamline vendor onboarding requests in your organization? In this post, I’ll walk you through an end-to-end automation built in Power Automate that allows users to submit…
Application Inventory Management | Use these templates
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of governance, and users signing up for applications on their own,…

