Select Page
OPS106: How to be an AD hybrid health hero

OPS106: How to be an AD hybrid health hero

Once you've connected your identity to Azure AD, how do you ensure it continues to function as expected? In this session, you'll learn how to keep your hybrid identity environment healthy, across different Active Directory and Azure Active Directory scenarios ... continue reading

Why operational resilience will be key in 2021, and how this impacts cybersecurity

The lessons we have learned during the past 12 months have demonstrated that the ability to respond to and bounce back from adversity in general, can impact the short-and long-term success of any organization. It can even dictate the leaders ... continue reading
5 identity priorities for 2021—strengthening security for the hybrid work era and beyond

5 identity priorities for 2021—strengthening security for the hybrid work era and beyond

When I outlined the five identity priorities for 2020, the world was a very different place. Since then, the COVID-19 pandemic has forever changed how organizations run their businesses. It’s also changed the way we work, learn, and collaborate. What ... continue reading
bh1.png

Upcoming changes to managing MFA methods for hybrid customers

Howdy folks! In November, I shared that we’re simplifying the MFA management experience to manage all authentication methods directly in Azure AD. This change has been successfully rolled out to cloud-only customers. To make this transition smooth for hybrid customers, ... continue reading
Line graph showing Azure AD app gallery monthly active users has grown over 109% year-over-year.

The state of apps by Microsoft identity: Azure AD app gallery apps that made the most impact in 2020

2020 was an unprecedented year, to say the least. The COVID-19 global pandemic drastically changed how we work, learn, and collaborate. Organizations had to find new ways to connect and maintain productivity while providing secure access to critical apps and ... continue reading
Thycotic Logo

Protecting multi-cloud environments with Azure Security Center

We’ve heard from many of you that multi-cloud adoption is becoming a standard operating model for your organization and that it’s challenging to have the right security controls and posture across your environment. Historically, security teams have not had effective ... continue reading
An example of an Azure Lighthouse ARM template offer and customer ARM template deployment workflow from the Azure Portal

4 reasons customers are asking service partners for Azure Lighthouse

This blog post was co-authored by Sonia Cuff, Senior Cloud Advocate Azure With an increasingly complex security landscape and an ever-growing service partner portfolio, how do you stay on top of industry-standard best practices? As your business needs grow, you ... continue reading
Zero Trust Principles

Using Zero Trust principles to protect against sophisticated attacks like Solorigate

The Solorigate supply chain attack has captured the focus of the world over the last month. This attack was simultaneously sophisticated and ordinary. The actor demonstrated sophistication in the breadth of tactics used to penetrate, expand across, and persist in ... continue reading
A clickable link to the full PDF infographic to the Zero Trust whitepaper

How IT leaders are securing identities with Zero Trust

The past twelve months have been a remarkable time of digital transformation as organizations, and especially digital security teams, adapt to working remotely and shifting business operations. IT leaders everywhere turned to Zero Trust approaches to alleviate the challenges of enabling and securing remote work ... continue reading
Diagram of high-level Solorigate attack chain

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

­Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading