Select Page
CAE Graphic 2.png

Moving towards real time policy and security enforcement

Hey folks, I would like to start by saying how amazed I am by the great work security and identity teams worldwide are doing to enable new work paradigms while enhancing security. Folks who were considering Zero Trust models are ... continue reading
identity-protection-policies.png

What’s the difference between Azure Active Directory Identity Protection and Conditional Access?

If you’ve moved your Identity service to Azure Active Directory, or if you’ve connected your Active Directory to Azure Active Directory, you might be interested in what additional security features Microsoft can provide. With Azure Active Directory (AAD), Microsoft has ... continue reading
Security guidance for remote desktop adoption

Security guidance for remote desktop adoption

As the volume of remote workers quickly increased over the past two to three months, the IT teams in many companies scrambled to figure out how their infrastructures and technologies would be able to handle the increase in remote connections ... continue reading
cv415.png

Securely collaborate with remote partners using Azure AD B2B collaboration

As COVID-19 public health guidance keeps suppliers, distributors, vendors and contractors at home, organizations around the world must figure out how to enable productivity for their blended workforce of employees and external partners. A few weeks ago, we shared 5 ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 4 – Apps

For our third stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Application security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading

Secure remote access to on-premises apps

As COVID-19 continues to require social distancing to ensure everyone’s safety, we have seen many companies support their employee’s needs and promote safety by allowing them to work from home and use online tools to collaborate. This has led to ... continue reading
Comparison of malicious emails used in malware campaigns before the crisis and during

Microsoft shares new threat intelligence, security guidance during global crisis

Ready or not, much of the world was thrust into working from home, which means more people and devices are now accessing sensitive corporate data across home networks. Defenders are working round the clock to secure endpoints and ensure the ... continue reading
Frequent questions about using Conditional Access to secure remote access

Frequent questions about using Conditional Access to secure remote access

Industry trends and changes in the way we work usually span years, with organizations evolving at their own pace. But we're living in unusual times. Organizations asking employees to work from home to slow the spread of COVID-19 are making ... continue reading
Zero Trust framework to enable remote work

Zero Trust framework to enable remote work

Zero Trust Assessment tool now live! With such a large influx of employees working remotely, many of the traditional network-based security controls are unable to protect the organization. For many organizations, there are two options: route all remote traffic through ... continue reading
Last1.png

Azure AD pass-through and password hash authentication support for SQL DB, DW and Managed Instance

We are announcing support for Azure AD pass-through and password hash authentication for Azure SQL DB (single database and database pools), Managed Instance, and Azure Synapse (formerly SQL DW). Azure AD password hash authentication is the simplest way to enable ... continue reading