A second security hole in the OpenBSD kernel…. in the last 10 years.
Talk about a solid OS.
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
A second security hole in the OpenBSD kernel…. in the last 10 years.
Talk about a solid OS.

Understanding the set of registered and enterprise apps active in a Microsoft 365 tenant is important. Attackers can sneak in and plant an app to exfiltrate or otherwise steal data. This article explains how to use PowerShell to create a service principal analysis report that highlights common problems and gives tenant administrators the data needed to manage apps.

In this blog, we review Microsoft’s 2025 Digital Defense Report and highlight the trends you need to know. From a surge in ransomware targeting hybrid environments to identity-based attacks at record levels, the report makes one thing clear: resilience and strong identity protection are critical.

Managing devices across large organizations can be complex. Administrative Units (AUs) help scope admin rights, but what about newly registered devices? In this article, we explain how to automate adding devices to the correct AU using Microsoft Graph and Azure Automation runbooks with managed identities—eliminating manual steps and improving security.