Select Page
One Ops Question:  What are the common Azure Stack Hub use cases

One Ops Question: What are the common Azure Stack Hub use cases

Azure Stack Hub is an extension of Azure that provides a way to run apps in an on-premises environment and deliver Azure services in your datacenter. In this episode of One Ops Question Thomas Maurer talks about the different use ... continue reading

The psychology of social engineering—the “soft” side of cybercrime

Forty-eight percent of people will exchange their password for a piece of chocolate,[1] 91 percent of cyberattacks begin with a simple phish,[2] and two out of three people have experienced a tech support scam in the past 12 months.[3] What ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading

Update your applications to use Microsoft Authentication Library and Microsoft Graph API

Howdy folks, Microsoft Build 2020 allowed us to engage deeply with our developer community, and we are continuing to improve how developers can easily use identity features in their applications. To help developers take advantage of all the identity features ... continue reading
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

The increasing pervasiveness of cloud services in today’s work environments, accelerated by a crisis that forced companies around the globe to shift to remote work, is significantly changing how defenders must monitor and protect organizations. Corporate data is spread across ... continue reading
DBada_0-1591745277270.png

Building trust into digital experiences with decentralized identities (DID)

Howdy folks, I have previously discussed how open standards help accelerate innovation. Today, I’d like to highlight some really significant progress in two important open standards efforts: Verifiable Credentials and Decentralized Identifiers. We view these two standards as being key ... continue reading

Business Continuity with Azure – Disaster Recovery

As someone who has worked in IT departments and an IT consultant for a Managed Service Provider (MSP), Business Continuity plans are something I’ve been involved in quite a lot. Either recovering from a threat or designing a solution that ... continue reading
Azure AD security enforcement with Continuous Access Evaluation

Azure AD security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading
Timely security enforcement with Continuous Access Evaluation

Timely security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Microsoft is providing a series of deployment guides for customers who have engaged in a Zero Trust security strategy. In this guide, we cover how to deploy and configure Azure Active Directory (Azure AD) capabilities to support your Zero Trust ... continue reading