Evaluating Privileged Identity Management Effectiveness
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
October 17, 2024
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
Misconfigured Conditional Access policies may introduce unnecessary risk to your tenant. That is why it is important to make sure these policies are properly configured. In this blog, Brandon Colley reviews the five most common Conditional Access misconfigurations.