Select Page
Frequent questions about using Conditional Access to secure remote access

Frequent questions about using Conditional Access to secure remote access

Industry trends and changes in the way we work usually span years, with organizations evolving at their own pace. But we're living in unusual times. Organizations asking employees to work from home to slow the spread of COVID-19 are making ... continue reading

Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios

With the bulk of end users now working remotely, legacy network architectures that route all remote traffic through a central corporate network are suddenly under enormous strain. The result can be poorer performance, productivity, and user experience. Many organizations are ... continue reading
Screenshot of a phishing email about a coronavirus update.

Protecting against coronavirus themed phishing attacks

The world has changed in unprecedented ways in the last several weeks due to the coronavirus pandemic. While it has brought out the best in humanity in many ways, as with any crisis it can also attract the worst in ... continue reading
New tools to block legacy authentication in your organization

New tools to block legacy authentication in your organization

Hey folks, If you’re a regular reader of this blog series, you know we’ve been advocating for admins to enable multi-factor authentication (MFA) for a while. In one of my previous posts, Your Pa$$word doesn’t matter, I showed how vulnerable ... continue reading

Data agility and open standards in health: FHIR fueling interoperability in Azure

Data agility in healthcare; it sounds fantastic, but there are few data ecosystems as sophisticated and complex as healthcare. The path to data agility can often be elusive. Leaders in health are prioritizing and demanding cloud technology that works on ... continue reading
Wadhrama PARINACOTA attack chain

Human-operated ransomware attacks: A preventable disaster

Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft ... continue reading
James Key_0-1582578534835.png

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 2 – Identity

Welcome to part two of “A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack. For those wanting to checkout part one which was the overview please click here. For our first stop on the journey to holistic ... continue reading

Common Questions about SHA2 and Windows

First published on TECHNET on Feb 08, 2011 Since my last post about SHA2 and Windows I’ve received numerous questions from customers and partners around three particular scenarios. This post will try to address those questions. Windows XP/2003 Enrollment in ... continue reading

Design Considerations before Building a Two Tier PKI Infrastructure

First published on TECHNET on Jun 19, 2010 Environmental Dependencies: 1- Determine if the Active Directory Forest has Windows 2000 Domain Controllers. This is important because of modifications to the CertPublishers group scope, and permissions related to the AdminSDHolder role ... continue reading
Quick Check on ADCS Health Using Enterprise PKI Tool (PKIVIEW)

Quick Check on ADCS Health Using Enterprise PKI Tool (PKIVIEW)

First published on TECHNET on Feb 28, 2011 PKIVIEW was first introduced in Windows Server 2003 Resource kit. The tool is installed by default when you install the Windows 2008 Active Directory Certificate Services Role, and had been re-branded as ... continue reading