Select Page
risk1.png

Risky Business in Azure AD…

Hi all, Zoheb here publishing on behalf of a guest author, Morne Naude. So without further ado... Hi Everyone, Morne here again and welcome to the first blog in our series on Azure Active Directory Security where we will be ... continue reading
An image showing each function works as part of a whole security team, within the organization, which is part of a larger security community defending against the same adversaries.

How to organize your security team: The evolution of cybersecurity roles and responsibilities

Digital transformation, cloud computing, and a sophisticated threat landscape are forcing everyone to rethink the functions of each role on their security teams, from Chief Information Security Officers (CISOs) to practitioners. With billions of people around the globe working from ... continue reading

Zero Trust: From security option to business imperative overnight

Not long ago when I spoke with customers about Zero Trust, our conversations focused on discussing the principles, defining scope, or sharing our own IT organization’s journey. Zero Trust was something interesting to learn about, and most organizations were very ... continue reading

Afternoon Cyber Tea: Revisiting social engineering: The human threat to cybersecurity

Most of us know ‘Improv’ through film, theatre, music or even live comedy. It may surprise you to learn that the skills required for improvisational performance art, can also make you a good hacker? In cybersecurity, while quite a bit ... continue reading

Johnson Controls simplifies remote access to legacy, on-prem apps with Azure AD and F5 BIG-IP APM

For organizations that operate a hybrid environment with a mix of on-premises and cloud apps, shifting to remote work in response to COVID-19 has not been easy. VPN solutions can be clumsy and slow, making it difficult for users to ... continue reading
SMC.png

How the Microsoft Mission Critical Team Helped Secure AAD

Hello everyone and welcome to our mind-blowing series of blogs we have lined up to show you the significant impact of the Azure Active Directory Security Features had for one of our SMC customer. This blog is a cumulative effort ... continue reading

Johnson Controls simplifies remote access to legacy, on-premises apps with Azure AD and F5 BIG-IP AP

For organizations that operate a hybrid environment with a mix of on-premises and cloud apps, shifting to remote work in response to COVID-19 has not been easy. VPN solutions can be clumsy and slow, making it difficult for users to ... continue reading
Microsoft Authenticator app lock now enabled by default

Microsoft Authenticator app lock now enabled by default

Howdy folks, We’re always listening to your feedback about Microsoft Authenticator and what we can do to make the app more secure and easier for end users. A few years ago, we released our App Lock feature in response to ... continue reading
SI1.png

End users can now report “This wasn’t me” for unusual sign-in activity

Howdy folks, I’m excited to announce the General Availability of Azure AD My Sign-Ins—a new feature that allows enterprise users to review their sign-in history to check for any unusual activity. As we discussed in the Public Preview blog post, ... continue reading
skissel_0-1596056074105.png

Turn Off “Automatically Dismiss Lock Screen When Face is Recognized” At Scale

Introduction Windows Hello in Windows 10 is a biometric means of recognizing a user and authenticating them to a device using a fingerprint, secure PIN, or face recognition. If a personal or corporate device is capable of face recognition, it ... continue reading