Select Page
Infographic which states 81 percent of hacking breaches leverage stolen and/or weak passwords.

Secure access to your enterprise with Microsoft 365 Enterprise E5

Most lessons in cybersecurity are born out of necessity. In this case, it was my need for a haircut. Last weekend, I was reminded why it’s time to rethink the conventional wisdom about secure passwords and user access. I was ... continue reading
Infographic showing a Shadow IT discovery lifecycle. Phase one: discover and identify. Phase two: evaluate and analyze. Phase three: manage and continuous monitoring.

Step 7. Discover shadow IT and take control of your cloud apps: Top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7. Discover shadow IT and take control of cloud apps,” you’ll learn how to set up Microsoft Cloud App Security ... continue reading

DART: the Microsoft cybersecurity team we hope you never meet

If you spent 270 days away from home, not on vacation, you’d want it to be for a good reason. When boarding a plane, sometimes having been pulled out of bed to leave family for weeks on end, I know ... continue reading
figure-01-WannaCry-user-APC-injection-technique-schematic-diagram

From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw

With Microsoft continuously improving kernel mitigations and raising the bar for exploiting native kernel components, third-party kernel drivers are becoming a more appealing target for attackers and an important area of research for security analysts. A vulnerability in a signed ... continue reading

5 steps financial institutions can take to reduce their cybercrime risk

When it comes to cybersecurity, financial institutions are uniquely challenged as they are often a target for hackers. My customers rightly worry about exposing their business and the broader financial system to a security breach. Some are reticent to adopt ... continue reading

How to deploy a VM template for PAW

First published on TECHNET on Nov 01, 2017 Continuing with the PAW series, after you followed the previous blog to build the PAW device, you can now deploy PAW VMs on it. There are two types of VMs you can ... continue reading
Privileged Access Workstation(PAW)

Privileged Access Workstation(PAW)

First published on TECHNET on Oct 13, 2017 At Ignite conference last month, Dean and I presented a session on PAW. Originally we were planning to just talk about the concept of PAW and how it is deployed in Microsoft ... continue reading
Leverage PowerShell Just Enough Administration for your Helpdesk

Leverage PowerShell Just Enough Administration for your Helpdesk

First published on TECHNET on Apr 24, 2017 [Today's guest post was authored by Dan Cuomo based on a real-world application of JEA] Hi Folks -- Platforms PFE Dan Cuomo here to talk about one method to enable the use ... continue reading

Rest easy with regulatory compliance in Windows Server 2016

First published on TECHNET on Apr 24, 2017 [This blog post was originally published at: https://blogs.technet.microsoft.com/hybridcloud/2017/04/11/rest-easy-with-regulatory-compliance-in-windows-server-2016/] Last month we learned that Windows Server 2016 has achieved Common Criteria certification for the General Purpose OS protection profile. This international standard is ... continue reading

Shielded VMs – additional considerations when running a guarded fabric

First published on TECHNET on Apr 21, 2017 So you’ve deployed a guarded fabric and your VMs are running happily. Having now reached that perfect steady state, let's have a look at the operational and administrative differences relative to a ... continue reading