Select Page

Improve security with a Zero Trust access model

Zero Trust is a security model that I believe can begin to turn the tide in the cybersecurity battles. Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can ... continue reading
Azure AD My Sign-Ins 1.png

Users can now check their sign-in history for unusual activity

Howdy folks, I’m excited to announce the public preview of Azure AD My Sign-Ins—a new feature that allows enterprise users to review their sign-in history to check for any unusual activity. As we discussed in a previous blog post, our ... continue reading

Your password doesn’t matter—but MFA does!

Your pa$$word doesn’t matter—Multi-Factor Authentication (MFA) is the best step you can take to protect your accounts. Using anything beyond passwords significantly increases the costs for attackers, which is why the rate of compromise of accounts using any MFA is ... continue reading
:smile:

All your creds are belong to us!

A few days ago, our team helped someone who had been a target of account takeover (ATO). Despite protecting the account with mandatory two-step verification using SMS and the Authenticator app, attackers had broken into the account and changed the ... continue reading
Azure AD expands integration with SAP Identity Authentication Service  1.png

Azure AD expands integration with SAP Identity Authentication Service

Howdy folks, I’m excited to share that you can now connect enterprise identities between Microsoft services such as, Azure and Office 365 and the SAP Cloud Platform, so you can build unique cross-cloud experiences! Through our partnership with SAP, you ... continue reading

Operational resilience begins with your commitment to and investment in cyber resilience

Operational resilience cannot be achieved without a true commitment to and investment in cyber resilience. Global organizations need to reach the state where their core operations and services won’t be disrupted by geopolitical or socioeconomic events, natural disasters, and cyber ... continue reading
Tips on PowerShell Modules for Managing Stale Devices

Tips on PowerShell Modules for Managing Stale Devices

Hi All, Alan here PFE from Italy, trying to give some little tips on how to install the correct PS module in order to use the required cmdlets for Stale Device Management. The article explaining this is: How To: Manage ... continue reading
Azure AD Mailbag: Tips for Azure AD reporting and monitoring your day-to-day activities

Azure AD Mailbag: Tips for Azure AD reporting and monitoring your day-to-day activities

Greetings! This is Sue Bohn, Director of Program Management for Identity and Access Management. One area where we invest a lot of time with our customers is Azure AD logs. Why? Because that’s where all the insights about your environment ... continue reading
Placeholder

IRAP protected compliance from infra to SAP application layer on Azure

This post was co-authored by Rohit Kumar Cherukuri, Vice President – Marketing, Cloud4C Australian government organizations are looking for cloud managed services providers capable of providing deployment of a platform as a service (PaaS) environment suitable for the processing, storage, ... continue reading
Animated image showing the number of malware attacks and data breaches organizations face every day. 4,000 daily ransomware attacks. 300,000,000 fraudulent sign-in attempts. 167,000,000 daily malware attacks. 81% of breaches are caused by credential theft. 73% of passwords are duplicates. 50% of employees use apps that aren't approved by the enterprise. 99.9% of attacks can be blocked with multi-factor authentication.

One simple action you can take to prevent 99.9 percent of attacks on your accounts

There are over 300 million fraudulent sign-in attempts to our cloud services every day. Cyberattacks aren’t slowing down, and it’s worth noting that many attacks have been successful without the use of advanced technology. All it takes is one compromised ... continue reading