Zero Trust with Microsoft Security Solutions: An Overview
In today’s rapidly evolving threat landscape, the traditional perimeter-based security model is no longer sufficient. As organizations adopt hybrid work […]
Real world business tracks leading towards Azure Services
In today’s rapidly evolving threat landscape, the traditional perimeter-based security model is no longer sufficient. As organizations adopt hybrid work […]
Wondering where to get started finding all the users in your Entra ID that do not have MFA enabled? Here’s some quick PowerShell to get you started and easily identify what users may be missed by your conditional access policies.
In this post, join me in exploring how to find meaningful actions taken by an administrator in your environment. We will take a look at how to find what changes were made by an individual account. Join me as we dive into auditing logs in Azure and determine if the administrator account is responsible for actions in our environment.
In today’s post I talk about responding to a compromised identity in Microsoft Entra ID. There is a lot of advice floating around on what to do and how to respond; I’m bringing experiences and existing guidelines together to provide a solid foundational starting point for identity based incident response in this post.
In the evolving landscape of cyber threats, ransomware operators are increasingly targeting unmanaged devices. These devices, including personal devices used for work-related tasks, often lack the robust security measures found in managed systems. Understanding these evolving threats and taking proactive steps to protect your organization is paramount. Today, our article delves into the challenges posed by unmanaged device compromises and offers comprehensive, actionable measures to bolster your defenses.
In today’s digital age, cyber threats have evolved into sophisticated attacks that exploit vulnerabilities on an unprecedented scale. It’s crucial to understand these threats and take proactive steps to protect your organization. In this article, we explore the evolving landscape of cybercrime and provide actionable measures to safeguard your digital assets. Today, we continue our journey through Microsoft’s Digital Defense Report 2023 and look at some actionable steps that can be taken to improve your organization’s security posture.
In the ever-evolving landscape of cybersecurity, one undeniable truth stands out—implementing fundamental security hygiene practices can thwart the vast majority of cyberattacks. By adhering to these minimum-security standards, it is possible to protect against over 99 percent of attacks. In this article, we’ll delve into these essential practices and explore how they can fortify your defenses.
Continuing the theme of exploring highlights from the Microsoft Digital Defense Report #MDDR 2023, today we walk through the top 5 security fundamentals to better enhance all organizations digital defenses.