Implementing zero trust in the world is a big hassle, often uncomfortable, and frequently dorky—plus, it can be expensive. At the same time, moving closer to a zero trust model helps harden your network significantly, and you may already have many of the tools and techniques you need available without much extra cost. In this article, we discuss how to take baby steps toward Zero Trust.
A writeup about the MERCURY attack by the Microsoft Threat Intelligence team reveals how a nation state actor linked to the Iranian government compromised an Azure AD tenant by using the AADConnect tool. In this article, we discuss how the attack developed and what you can do to prevent the same attack techniques being used against your tenant.
In this edition of Practical Protection with Paul Robichaux, we dive into understanding what multi-tenant applications are, what they can do, and how to manage them in order to keep your tenant and users safe.
Conditional Access policies are one of Microsoft's most versatile and flexible security features ever built. However, there’s one area that Conditional Access can help you protect that isn’t as well known—using IP restrictions to control where a specific app can be used.
Hybrid work is really a mixed blessing—while it offers a lot of fantastic benefits for people who are able to take advantage of it, it can introduce some new and unpleasant security issues that you need to be prepared to deal with. This article dives into these new risks and how you can avoid them.
It Is known that Microsoft encrypts data both at rest and in transit, but is this enough protection for your documents? In this article, Paul Robichaux goes over adding an extra layer of protection through Double-Key and Customer Key Encryption.
A thorough understanding of what Defender for Office 365 can do is important as you consider how best to protect your tenant. In this edition of Practical Protection, Paul deep dives into the umbrella brand of Microsoft Defender and its individual products.