Secure Application Management | Getting Started
How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like most organizations, the answer is either “no” or “we have…
How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like most organizations, the answer is either “no” or “we have…
In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and incident response. Unfortunately, the default data retention periods for Entra…
Some of you out there might be thinking, “not another article on the end of passwords, we’ve been listening to this for years.” And to your credit, you are spot…
If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay tuned because in this article, I…
Did you know that users outside your organization can initiate Teams chats with other members of your team by default in Microsoft 365? Attackers are leveraging this to conduct sophisticated…
If Microsoft 365 security feels very ad hoc and reactive to you today, stay tuned because in this blog I am going to show you a tool I built that…
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the mix. Guest users can: Download…
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of maintaining persistence for hackers is to…
Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know what, we are just going to let our pilots fly…
In today’s remote and hybrid workforce, we’re getting more pushback than ever from customers on preventing access to corporate resources on personal or Byod devices. In this article, I want…