One of the main reasons that application governance is often overlooked, as it relates to an organization’s cloud security posture, is because the topic is not fully understood. . However, it is vitally important to understand the fundamentals of Microsoft Entra ID (formerly Azure Active Directory) – tenants, app registrations, enterprise apps, and consent –...
Last Update: Apr 17, 2024
Last Update: Apr 17, 2024
Microsoft Entra ID, formerly Azure Active Directory (AD), is Microsoft’s cloud-native identity management platform. It only takes one compromised Entra ID user account to consent to a rogue app that siphons all the user’s Microsoft 365 data or to take over their mailbox. Business Email Compromise (BEC) amounts to $8 million in losses on a…
Last Update: Apr 16, 2024
How to set up Azure Active Directory Domain Services
Last Update: Apr 08, 2024
Identity and Access Management (IAM), is a crucial cybersecurity framework that governs and secures digital access to resources. It plays a pivotal role in helping organizations control and secure their digital resources such as apps, files, user identities, permissions, and all other organizational data. IAM also helps ensure the confidentiality and integrity of sensitive information….
Last Update: Apr 08, 2024
Russell explain what multi-factor authentication is and why you should enable it.
Last Update: Apr 01, 2024
Conditional Access is a security feature that allows organizations to control corporate resource access based on certain conditions. Common reasons for utilizing this technology include the enforcement of multifactor authentication (MFA), requiring stronger authentication measures during authentication, and more. Learn more about how to use Conditional Access to protect your data and devices. What is…
Last Update: Feb 07, 2024
Sjoukje Zaal gives an overview of the different flavors of Azure Active Directory.
Last Update: Feb 01, 2024
For any modern enterprise that uses Azure Active Directory (now Microsoft Entra ID) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for…
Last Update: Jan 30, 2024
In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…
Microsoft has announced plans to introduce new Conditional Access policies that will automatically protect customers against potential cyberattacks. Starting next week, the company will begin rolling out the new policies to all eligible commercial customers. “We’ve designed these policies based on our deep knowledge of the current cyberthreat landscape to help our customers strengthen their…