Select Page
New: Require reauthentication for Intune enrollment or risk

New: Require reauthentication for Intune enrollment or risk

Good afternoon! Explicitly verifying identity and devices is a top priority for organizations adopting Zero Trust. For some critical operations, it’s important to be able to re-prompt the user to ensure no one is “borrowing” their device or has stolen ... continue reading
Enterprise Scale for Azure VMware Solution

Enterprise Scale for Azure VMware Solution

Enterprise Scale for Azure VMware Solution soon to be Azure VMware Solution Landing Zone Accelerator In this video, from the Azure VMware Solution digital event on March 23, 2022, learn from Sapna Jeswami, Technical Program Manager Microsoft and Prasad Gandham, ... continue reading

Discover the anatomy of an external cyberattack surface with new RiskIQ report

The internet is now part of the network. That might sound like hyperbole, but the massive shift to hybrid and remote work and a multicloud environment means security teams must now defend their entire online ecosystem. Recent ransomware attacks against ... continue reading
Azure VMware Solution (AVS) for VMware Admins - Assessment and Migration

Azure VMware Solution (AVS) for VMware Admins – Assessment and Migration

Assessing your environment There are many tools you may or not be familiar with, depending on your background to, assess which workloads are eligible to migrate to Azure VMware Solution. Microsoft offers Azure Migrate where you can download an OVA ... continue reading
Partial screenshot of a messaging application showing a text message from LAPSUS$ with the following heading:  We recruit employees/insider at the following!!!!

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

In recent weeks, Microsoft Security teams have been actively tracking a large-scale social engineering and extortion campaign against multiple organizations with some seeing evidence of destructive elements. As this campaign has accelerated, our teams have been focused on detection, customer ... continue reading
™

A Leader in multiple Zero Trust security categories: Industry analysts weigh in

The massive shift toward remote and hybrid work over the last two years has prompted many security professionals to reassess where siloed security may create vulnerabilities.1 For that reason, Zero Trust has become the gold standard for enterprise security. An ... continue reading
Diagram showing an attacker having access to a C2 server, a compromised IoT device, and a target network, all of which have a line of communication running through them. To the right of each component, corresponding attack chain routines related to it are depicted.

Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure

Trickbot, a sophisticated trojan that has evolved significantly since its discovery in 2016, has continually expanded its capabilities and, even with disruption efforts and news of its infrastructure going offline, it has managed to remain one of the most persistent ... continue reading
Organize packages and update groups in Configuration Manager TP 2202

Organize packages and update groups in Configuration Manager TP 2202

Update 2202 for the Technical Preview Branch of Microsoft Endpoint Configuration Manager has been released. In this release, Admins will be able to organize packages and update groups in a much better way using folders. This feature helps to enable ... continue reading
Identities and endpoints as their authentication and compliance requests are intercepted by the Zero Trust Policy for verification before being granted access to networks and the data, apps, and infrastructure they’re composed of.

4 best practices to implement a comprehensive Zero Trust security approach

Today’s threat actors don’t see barriers, they see opportunities. As the old firewalls protecting the corporate network become obsolete amid the rush to adopt a hybrid workspace, implementing Zero Trust security has become an imperative across all sectors, both public ... continue reading
How to transfer files to your Azure VM with no public open RDP port

How to transfer files to your Azure VM with no public open RDP port

Microsoft released Azure Bastion as a way to connect with a remote session into a virtual machine (VM) on Microsoft Azure, without needing to have the VM’s RDP port available on the internet. Now you can keep port 3389 closed ... continue reading