Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios
With the bulk of end users now working remotely, legacy network architectures that route all remote traffic through a central corporate network are suddenly under enormous strain. The result can be poorer performance, productivity, and user experience. Many organizations are ... continue reading
Use Intune MAM to Control Office Mobile Apps and Office 365 Content
Greetings! As you all know, well-managed and secure remote access is a key aspect of Microsoft solutions. As most of us have seen, working remotely has taken on new scale and urgency right now and people across Microsoft have published ... continue reading

Defending the power grid against supply chain attacks—Part 2: Securing hardware and software
Artificial intelligence (AI) and connected devices have fueled digital transformation in the utilities industry. These technological advances promise to reduce costs and increase the efficiency of energy generation, transmission, and distribution. They’ve also created new vulnerabilities. Cybercriminals, nation state actors, ... continue reading

Protecting against coronavirus themed phishing attacks
The world has changed in unprecedented ways in the last several weeks due to the coronavirus pandemic. While it has brought out the best in humanity in many ways, as with any crisis it can also attract the worst in ... continue reading
How to Implement Center for Internet Security (CIS) recommendations for Azure
In the big wide world of security, it can be hard to know what Azure resource settings give you the best possible security posture. Organisations like the USA-based National Institute of Standards and Technology and the Center for Internet Security ... continue reading
New tools to block legacy authentication in your organization
Hey folks, If you’re a regular reader of this blog series, you know we’ve been advocating for admins to enable multi-factor authentication (MFA) for a while. In one of my previous posts, Your Pa$$word doesn’t matter, I showed how vulnerable ... continue reading

Empower Firstline Workers with Azure AD and YubiKey passwordless authentication
At the end of February, Microsoft announced the FIDO2 passwordless support for hybrid environments. The integration of FIDO2-based YubiKeys and Azure Active Directory (Azure AD) is a game changer. It combines the ubiquity of Azure AD, the usability of YubiKey, ... continue reading
Top 5 ways your Azure AD can help you enable remote work
While remote work is a common feature of modern workplaces, it’s become an imperative in light of the current worldwide Coronavirus (COVID-19) outbreak. Where it’s feasible, enabling work to happen from homes is a key way to help keep our ... continue reading
Quick wins—single sign-on (SSO) and Multi-Factor Authentication (MFA)
With Multi-Factor Authentication (MFA) and single sign-on (SSO) being a few of the most effective countermeasures against modern threats, organizations should consider a Cloud Identity as a Service (IDaaS), and MFA solution, like Azure Active Directory (AD). Here are seven ... continue reading

Changing the Monolith—Part 4: Quick tech wins for a cloud-first world
You may have heard that identity is the “new” perimeter. Indeed, with the proliferation of phishing attacks over the past few years, one of the best ways to secure data is to ensure that identity—the primary way we access data—can ... continue reading