Select Page
Step 4. Set conditional access policies: top 10 actions to secure your environment

Step 4. Set conditional access policies: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and ... continue reading
Azure AD makes sharing and collaboration seamless for any user with any account

Azure AD makes sharing and collaboration seamless for any user with any account

Howdy folks, Azure AD B2B Collaboration provides customers with an easy way to share applications and collaborate with people from any organization, whether or not they have Azure AD or an IT department. We’ve been working to make B2B Collaboration ... continue reading
Single sign-on wins over business and users at lululemon!

Single sign-on wins over business and users at lululemon!

Howdy folks! Does your organization struggle with too many passwords and too many portals? If so, we have a new blog post in our Voice of the Customer series that I think you will find valuable. Simon Cheng at lululemon ... continue reading
Step 3. Protect your identities: top 10 actions to secure your environment

Step 3. Protect your identities: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 3. Protect your identities, youll learn how to define security policies to protect individual user ... continue reading
Zero Trust part 1: Identity and access management

Zero Trust part 1: Identity and access management

Once in a while, a simple phrase captures our imagination, expressing a great way to think about a problem. Zero Trust is such a phrase. Today, Ill define Zero Trust and then discuss the first step to enabling a Zero ... continue reading
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, ... continue reading

Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge

Peter Vallianatos, director of IT Infrastructure and Security, and Phillip Nottoli, director of Enterprise Architecture at The Walsh Group. Hello! This is Sue Bohn from the Customer & Partner Success team for the Identity Division. Im delighted to announce the ... continue reading

CISO series: Strengthen your organizational immune system with cybersecurity hygiene

One of the things I love about my job is the time I get to spend with security professionals, learning firsthand about the challenges of managing security strategy and implementation day to day. There are certain themes that come up ... continue reading

Phishing with the Sharks Using the Attack Simulator

Hello, Paul Bergson back again. It is late fall and once again playoff time for High School and Collegiate volleyball. Women’s volleyball in Minnesota is a big deal and I have played and coached for over 30 years and I ... continue reading
SSMS 17.9.1 is now generally available

SSMS 17.9.1 is now generally available

We are excited to announce the release of SQL Server Management Studio (SSMS) 17.9.1. Download SSMS 17.9.1 today and for details please see the Release Notes. This is a minor update to 17.9 with the following important improvements: Occasionally, SSMS ... continue reading