Zero Trust

Security

Five Tactics Towards Achieving Zero Trust with Azure Active Directory

For any modern enterprise that uses Azure Active Directory (now Microsoft Entra ID) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for...

Last Update: Feb 01, 2024

LATEST

How to Deploy Zero Trust Identity Security

Last Update: Sep 07, 2023

This is the second article in the Zero Trust Security in Microsoft 365 series. Here you will gain an understanding of the strategies to deploy Zero Trust Identity Security. Managing identity will always be at the forefront of this security model. Environments with proper identity policies are better placed to handle attempts at gaining access…

View Article
AirDroid Business enterprise and mobile device management

Securing Enterprise Devices: Embracing Zero Trust Security

The excessive use of digital devices in enterprises and their exposure to various networks have increased the probability of cyber-attacks. Enterprise-owned devices contain confidential data that hackers can easily access if devices are not controlled efficiently, and that can cause damage to the values and reputation of the organizations. Thus, data security is now of…

View Article

Guide: Getting Started with Zero Trust Security in Microsoft 365

Last Update: Aug 29, 2023

Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…

View Article
Cloud Computing

Zero Trust: How Azure Active Directory and Identity Management Enable Cloud Security 

Last Update: Aug 29, 2023

After the successful SolarWinds attack in 2020 where attackers gained access to Microsoft’s systems, Microsoft changed its approach and aligned with the National Institute of Standards and Technology’s (NIST) zero trust architecture. In this article, we’re going to detail how Microsoft’s zero trust approach leverages Azure Active Directory and Identity and Access Management to enable cloud…

View Article

How to Enable Windows Hello for Business

Last Update: Jul 24, 2023

In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login….

View Article

How to Register Windows 10 with Azure Active Directory

Last Update: Jul 17, 2023

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to register Windows 10 with Azure Active Directory. You will 1) register a Windows 10 device…

View Article

How to Join Windows 10 to Azure Active Directory

Last Update: Jul 17, 2023

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10…

View Article
Security

How to Secure Sensitive Data in Microsoft 365

We’ve come a long way since those days and have seen technology evolve to support data stored in business cloud platforms such as Microsoft 365. In recent years, the digital revolution has made data more portable and more accessible, but crucially it has also made that data more vulnerable in many ways. Fortunately, if your organization…

View Article
Network Security

What is a Software-Defined Perimeter?

A software-defined perimeter (SDP) is a modern network security framework for creating a virtual network perimeter to protect an organizational infrastructure from outsiders. In this article, I’ll explain how a software-defined perimeter works and what are the main use cases for this new computer security approach. With increasingly complex network and application security requirements, a…

View Article
Go to page