Practical Protection: Understanding Entra ID and Passkeys
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.
In this edition of Practical Protection, Paul Robichaux dives into 5 steps you can take to protect yourself, and potentially your organization, from future breaches.
Microsoft recently released a revamped version of LAPS that can store the local admin password in Entra ID to work with cloud-managed endpoints. In this blog, we dive into deploying LAPS and how to use it to further enhance the security of Windows endpoints.
Microsoft introduces Microsoft Security Exposure Management (MSEM)! In this blog, Paul discusses MSEM and offers some advice for things you can do before the tool is pushed to GA.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
In this blog, we review a new organized phishing campaign impacting Azure Cloud environments and discuss what to do if your organization happens to fall victim.
Microsoft released cumulative update 14 for Exchange Server 2019 on February 13, 2024. This update fixes several bugs, but more importantly, contains a fix for a serious security issue that is being exploited in the wild. This is your sign to enable Extended Protection, if you haven't already.
In this blog, Jon Jarvis reviews the importance of integrating devices with Intune, and the risks that can arise from poorly managed devices.
User consent is a great example of the tension between improved security and user convenience. Users want to be able to consent to applications without requiring the help of IT, which also allows the potential for a breach. In this blog, Paul reviews your options to solving the user consent problem.
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.
Unfortunately, attacks happen... But a post-attack investigation is paramount to stopping the next attack. In this blog, Paul Robichaux reviews what to do after an attack has taken place, with practical tips along the way.