Select Page

Gain real-time identity protection with Microsoft and Recorded Future

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  You’ve implemented multifactor authentication for access to your enterprise network. But what if multifactor authentication isn’t as foolproof as you’re hoping? Are you comfortable ... continue reading
Customize your authentication flows with custom claims providers!

Customize your authentication flows with custom claims providers!

Howdy folks,  I’m super excited to announce the public preview of custom claims providers for Azure Active Directory (Azure AD), now part of Microsoft Entra.   A custom claims provider lets you call an API and map custom claims into ... continue reading
Line chart showing trend of number of daily DDoS attacks targeting healthcare

KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks

In the last year, geopolitical tension has led to an uptick of reported cybercrime events fueled by hacktivist groups. The US Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn organizations about these attacks and teamed with the ... continue reading
DEV-1101 AiTM tool announcement noting a license as $100 along with contact information and links.

DEV-1101 enables high-volume AiTM campaigns with open-source phishing kit

Adversary-in-the-middle (AiTM) phishing kits are part of an increasing trend that is observed supplanting many other less advanced forms of phishing. AiTM phishing is capable of circumventing multifactor authentication (MFA) through reverse-proxy functionality. DEV-1101 is an actor tracked by Microsoft ... continue reading

Field tips for AKS storage provisioning

Introduction In an Azure Kubernetes (AKS) cluster, Pods can access physical storage resources such as disks or volumes using Persistent Volumes (PV). To use these resources, Pods need to make a Persistent Volume Claim (PVC), which requests a specific amount ... continue reading
R.png

The beginning of the end of Remote Mailslots

Heya folks, Ned here again. With the release of Windows 11 Insider Preview Build 25314, we have started disabling the Remote Mailslot protocol by default. This is a precursor to deprecation and eventual removal from Windows. You aren't using this extremely legacy ... continue reading
R.png

The beginning of the end of Remote Mailslots

Heya folks, Ned here again. With the release of Windows 11 Insider Preview Build 25314, we have started disabling the Remote Mailslot protocol by default. This is a precursor to deprecation and eventual removal from Windows. You aren't using this extremely legacy ... continue reading

Identity Innovation for a More Secure Nation

With more than 1000 identity attacks occurring each second1, government agencies are tasked with serving the public amidst the most challenging cybersecurity environment in history. Protecting the freedom of citizens makes them a prime target for bad actors across the ... continue reading

5 reasons to adopt a Zero Trust security strategy for your business

Adopting Zero Trust security for your enterprise is no longer a wish-list item—it’s a business imperative. The workplace today extends to almost anywhere, anytime, from any device. Siloed, patchwork security solutions leave gaps that threat actors continue to exploit. A ... continue reading
Picture1

What’s new in Azure Data & AI: Azure is the best place to build and run AI workloads

It’s not every day that you get to be a part of something being discussed at dinner tables around the world—and we’re hearing this from customers and partners too. They’re eager to reimagine how they do business, embracing generative AI ... continue reading