Practical Protection: Leveling up Conditional Access Policy Management
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
Many organizations still find it challenging to implement Conditional Access effectively. Luckily, there is a solution for this. In this blog, we share a new open-source framework, introducing 4 tools to help create and validate access policies and strategies, ensuring that security measures are effective and efficient.
It's that time of the year again! In this episode of Practical Protection, we review the 2024 Microsoft Digital Defense Report and offer our recommendations to protect against the emerging and current threat.
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
No one likes spending money! In this episode of Practical Protection, we dive into imposing cost on attackers, hopefully deterring them from attacking in the first place.
Dynamic watermarking is a new feature for sensitivity labels that's intended to provide a visual deterrent to screen captures of confidential documents. The feature works by using the email address of the signed-in user as a watermark. Everything works and the feature seems effective, but this isn't something to use with every sensitivity label.
After identifying what networking data you should ingest into Sentinel, the next step is to start creating alerts and incidents using the data. And that is exactly what we cover in this episode of Practical Sentinel.
Looking to score that raise? In this episode of Practical Protection, we dive into Microsoft 365 Secure score, how it works, and help you better secure your Microsoft cloud environments.