Security

LATEST

Security hero image

Active Directory Security – 5 Steps to Secure AD

Last Update: Jan 30, 2024

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article
Azure Cloud Hero

Top Azure Cloud Security Controls to Understand

Last Update: Jan 08, 2024

This short guide will provide a top-level overview of the crucial Azure cloud security controls and best practices to be aware of. The highlighted suggestions will provide you with options worth considering for deployment across your estate to strengthen your security posture and mitigate the evolving number and severity of cloud-based threats and risks that…

View Article
microsoft security hero approved

Microsoft Details FIDO2 Security and Certificate-Based Authentication Updates

Last Update: Dec 19, 2023

Microsoft has detailed its efforts to enable phishing-resistant authentication methods for organizations. The company is implementing several security features, including device-bound passkeys, FIDO2 support for iOS and macOS apps, and Certificate-Based Authentication updates, to enhance the overall protection for all Entra ID customers. Microsoft has announced that it will soon introduce a new feature for…

View Article
PowerShell

Set-ExecutionPolicy – Mastering PowerShell Execution Policy

Last Update: Dec 08, 2023

PowerShell is considered secure by default due to various design principles and features that Microsoft incorporated into its architecture. These measures aim to ensure that PowerShell provides a robust, yet safe, scripting environment for system administration tasks. One feature of PowerShell that contributes to this are known as execution policies, which can be set using…

View Article
Security

Microsoft Expands Protection: Enterprise IoT Security Now Part of Microsoft 365 E5 and E5 Security Plans

Microsoft has announced that enterprise IoT (eIoT) security capabilities are now available for organizations with Microsoft 365 E5/E5 security subscriptions. This release makes it easier for enterprise customers to monitor unmanaged enterprise IoT devices, detect anomalies, and improve security posture. Enterprise IoT (eIoT) security offers visibility and security for internet-connected devices and networks in business…

View Article
Cloud Computing

Streamlining SaaS Governance: How Nudge Security Simplifies Compliance and Security Management for Cloud Apps

Last Update: Nov 03, 2023

Nudge Security provides a simple and easy to implement solution to a challenging problem for organizations managing compliance, security, and governance of third-party cloud apps and services. Its simplicity encourages governed use of SaaS apps and the ability to monitor new apps and user signups. Nudge Security is a powerful alternative to complex products like…

View Article
Datacenter networking servers

Azure VMware Solution – Maximizing Security and Control with Customer-Managed Keys

Last Update: Oct 10, 2023

In this article, I look at Azure VMware Solution, a Microsoft virtual machine (VM) service, verified by VMware, that runs on Microsoft Azure infrastructure. And specifically, how you can add a second layer of encryption to your datastore and ensure Microsoft cannot read or write any data within your private cloud. Data security is a…

View Article
Security hero image

New ZeroFont Phishing Technique Lets Hackers Show Fake AV Scans in Outlook Emails

Security researchers have discovered that hackers are now employing a new zero-point font obfuscation technique to target Microsoft Outlook users. Unlike traditional phishing emails that try to evade automated detection, this novel approach aims to deceive recipients by making emails appear more trustworthy. In a recent report published by the SANS Internet Storm Center, cybersecurity…

View Article

Auditing Access to Microsoft LAPS Passwords in Active Directory

Last Update: Sep 19, 2023

Russell shows you how to audit access to LAPS passwords in Active Directory and how to establish a process for managing access to local administrator passwords.

View Article

Azure Sentinel, Microsoft’s Cloud-Native SIEM Solution, Is Now Generally Available

Last Update: Sep 13, 2023

Microsoft announced September 25th on its Security blog that Azure Sentinel has reached general availability. Based on Azure Monitor Log Analytics, Sentinel adds a cloud-native Security Information and Event Management (SIEM) solution to Azure’s already long list of services.

View Article
Go to page