Select Page
Azure AD security enforcement with Continuous Access Evaluation

Azure AD security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading
Timely security enforcement with Continuous Access Evaluation

Timely security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading

Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2

This is the sixth blog in the Lessons learned from the Microsoft SOC series designed to share our approach and experience from the front lines of our security operations center (SOC) protecting Microsoft and our Detection and Response Team (DART) ... continue reading

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Microsoft is providing a series of deployment guides for customers who have engaged in a Zero Trust security strategy. In this guide, we cover how to deploy and configure Azure Active Directory (Azure AD) capabilities to support your Zero Trust ... continue reading
Unlimited SSO and new Azure AD features to simplify secure access management

Unlimited SSO and new Azure AD features to simplify secure access management

Howdy folks, It’s been a busy period for the IT community. From enabling secure remote access and secure remote collaboration to empowering essential Firstline Workers—everything had to adjust to the challenges necessitated by COVID-19. We have continued working with customers ... continue reading
diagram showing different attack stages and techniques in each stage that various ransomware groups use

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

At a time when remote work is becoming universal and the strain on SecOps, especially in healthcare and critical industries, has never been higher, ransomware actors are unrelenting, continuing their normal operations. Multiple ransomware groups that have been accumulating access ... continue reading
Protect your customer accounts with passwordless mobile authentication

Protect your customer accounts with passwordless mobile authentication

Hello! In today’s ‘Voice of the ISV’ story, Jim Small and Milan Radojkovic at IPification describe how IPification mobile authentication and Azure Active Directory (Azure AD) B2C deliver improved security and a better user experience to our mutual customers. Don’t ... continue reading
Protecting your organization against password spray attacks

Protecting your organization against password spray attacks

When hackers plan an attack, they often engage in a numbers game. They can invest significant time pursing a single, high-value target—someone in the C-suite for example and do “spear phishing.” Or if they just need low-level access to gain ... continue reading

Inside Identity: Securing users in a multi-cloud environment with Duo

In the third episode of “Inside Identity,” I sat down with Ruoting Sun, Head of Technology Partnerships & Commercial Expansion at Duo Security (part of Cisco). Duo provides a multi-factor authentication solution that integrates with Azure Active Directory (Azure AD) ... continue reading
CAE Graphic 2.png

Moving towards real time policy and security enforcement

Hey folks, I would like to start by saying how amazed I am by the great work security and identity teams worldwide are doing to enable new work paradigms while enhancing security. Folks who were considering Zero Trust models are ... continue reading