Prevent bad actors from maintaining persistence in Microsoft 365
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after.…
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after.…
In previous articles, I’ve talked about how Passkeys are one of the strongest forms of MFA that you could roll…
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack…
As a general principle, you should always try to institute a strict policy of requiring managed devices to access corporate…
Checklist do not equal compliance One of the major gaps I hear when talking to MSPs about security and compliance…
Checklist do not equal compliance One of the major gaps I hear when talking to MSPs about security and compliance…
🛡️ Mapping Microsoft 365 Security Controls to NIST CSF 2.0 NIST has released the 2.0 draft of its Cybersecurity Framework…
Many of us out there are using Microsoft Teams as our main source of collaboration. This includes chats, meetings, and…
When the Cybersecurity & Infrastructure Security Agency (CISA) released the Secure Cloud Business applications (SCuBA) project, I was pretty excited…
In this article, I wanted to break down some of the trends in the Cyber Insurance market that I am…