Practical Protection: Two Kinds of Bad
In this installment of practical protection, we dive into two kinds of crimes, and how you can practically apply that knowledge to securing your network and services within your organization.
In this installment of practical protection, we dive into two kinds of crimes, and how you can practically apply that knowledge to securing your network and services within your organization.
In this episode of Practical Sentinel, we dive into the MITRE ATT&CK framework and how to integrate it within your environment through Microsoft Sentinel & Defender XDR.
With 2025 in full swing, it's time to do some reflecting! In this episode of practical protection, we look back at the major Microsoft security events in 2024 and how you can prepare yourself for what's to come in 2025.
This episode of Practical Protection dives into connected experiences, what they are, and debunks some claims that were made regarding AI models using customer data via Connected Experiences.
In this episode of Practical Sentinel, we explain how to use Microsoft Sentinel’s SOAR capabilities to build automation on top of networking data through enrichments, automated actions, and threat intelligence integrations.
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
Many organizations still find it challenging to implement Conditional Access effectively. Luckily, there is a solution for this. In this blog, we share a new open-source framework, introducing 4 tools to help create and validate access policies and strategies, ensuring that security measures are effective and efficient.
It's that time of the year again! In this episode of Practical Protection, we review the 2024 Microsoft Digital Defense Report and offer our recommendations to protect against the emerging and current threat.
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.