Practical Protection: Microsoft Introduces “Cloud PKI”
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
In this blog, we review a new organized phishing campaign impacting Azure Cloud environments and discuss what to do if your organization happens to fall victim.
Microsoft released cumulative update 14 for Exchange Server 2019 on February 13, 2024. This update fixes several bugs, but more importantly, contains a fix for a serious security issue that is being exploited in the wild. This is your sign to enable Extended Protection, if you haven't already.
In this blog, Jon Jarvis reviews the importance of integrating devices with Intune, and the risks that can arise from poorly managed devices.
User consent is a great example of the tension between improved security and user convenience. Users want to be able to consent to applications without requiring the help of IT, which also allows the potential for a breach. In this blog, Paul reviews your options to solving the user consent problem.
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.
Unfortunately, attacks happen... But a post-attack investigation is paramount to stopping the next attack. In this blog, Paul Robichaux reviews what to do after an attack has taken place, with practical tips along the way.
Patching your systems manually can be complicated and require a lot of overhead. Luckily, Microsoft has a new solution to help with this. In this blog, Paul Robichaux reviews the new Windows Autopatch tool and what it has to offer.
You might be at risk for a similar attack to Microsoft's Midnight Blizzard attack. In this blog, Paul Robichaux discusses what happened and how to avoid this in your organization.
A January 19 report from the Microsoft Security Response Center (MSRC) tells of an attack by Russian state actor Midnight Blizzard against Microsoft corporate systems. The attack resulted in the exfiltration of some email and documents from email accounts owned by senior Microsoft employees.
What does your Incident Response plan look like? In this blog, Paul Robichaux reviews what to expect when building your own Incident Response Plan.
In this article, we discuss how to enhance mobile security in MAM, focusing on the Defender for Endpoint functionality and features related to mobile devices, specifically for BYOD scenarios.