Practical Protection: Do You Need a Cybersecurity Reference Architecture?
In this Edition of Practical Protection, Paul Robichaux dives into Microsoft's Cybersecurity Reference Architecture and discusses if you really need it.
In this Edition of Practical Protection, Paul Robichaux dives into Microsoft's Cybersecurity Reference Architecture and discusses if you really need it.
With the end of the year in sight, we wanted to look back and see how Microsoft performed with security products in 2023, reviewing some of Microsoft’s biggest announcements and discussing if Microsoft's focus is leaning in the right direction.
The NSA and CISA released a joint bulletin titled “Top Ten Cybersecurity Misconfigurations.” In this blog, Paul Robichaux reviews a few of the most significant suggested mitigations from this bulletin.
This edition of Practical Protection is all about theory and playing games. In this blog, Paul Robichaux explains how to improve your security posture by setting up hypothetical scenarios in your environment.
The Storm-0558 incident serves as a stark reminder of the potential threats that organizations face in today's digital landscape. In this blog, Rich Dean recaps the insider conversation around Storm-0558 that the Practical 365 Podcast team had with Alex Weinert, Microsoft's VP for Identity Security.
In this blog, Paul Robichaux reviews how to add additional protection to Microsoft Admin Portal Apps through MFA.
In this installment of Practical Protection, Paul Robichaux Talks about Password Banning in your Entra ID Tenant and why everyone should implement this extra layer of protection.
Security is not a one-time thing. We must improve configurations as products evolve and new situations arise. In this blog, James Yip dives into his top five security topics for Microsoft 365 Projects.
It's that time of the year again! Microsoft is releasing their annual Microsoft Digital Defense Report (MDDR), and you may want to give it a read. In this blog, we talk about the highlights from the MDDR and offer some advice to better protect your organization.
Apart from being annoying, advertisements can actually be used to deliver malware. This blog explains what "Malvertising" is and how to secure your network from these attacks.
Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's processing of data. Microsoft says that the holes are now closed, but it's still a good idea to check that your tenant is not being attacked in the same way.