<img alt="" src="https://secure.hims1nice.com/151009.png" style="display:none;">
" style="background-color: #2c3e50;">
 

Blogs

Information Protection: The missing link

Posted by Cliff Embry on Jun 29, 2022 10:33:11 AM
Read More

Topics: Security, cloud security, M365

Microsoft Follina and Dogwalk Zero-Day Protection

Posted by Cliff Embry on Jun 10, 2022 6:30:40 PM

Defend against Follina and DogWalk

On May 30th, 2022, Microsoft issued CVE-2022-30190

This was in reference to the Follina, the first zero-day. The guidance reads:

"A remote code execution vulnerability exists when MDST is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights."

Read More

Topics: Security, cloud security, M365

Conditional Access 101 | Why you need it and how to use it

Posted by Curtiss Adams on Apr 5, 2022 8:30:00 AM
Read More

Topics: Security, cloud security

Microsoft Purview Information Protection Demystified

Posted by Cliff Embry on Mar 23, 2022 2:00:58 PM
Read More

Topics: Security, cloud security

Shields Up Security Guidance Issued | How to prepare for state-sponsored cyber threats

Posted by Cliff Embry on Mar 7, 2022 12:28:41 PM
Read More

Topics: Security, cloud security, M365

Improve Your IoT, OT, and Firmware Security

Posted by Curtiss Adams on Jul 27, 2021 11:49:08 AM
Read More

Topics: Security, IoT, cloud security

Why are landing zones essential to Azure success?

Posted by Eric Rhoads on Jan 6, 2021 10:30:00 AM
Read More

Topics: Azure, Business Process, cloud security

Auditing role assignments with Privileged Identity Manager (PIM)

Posted by Tom Kozel on Oct 19, 2020 10:00:00 AM
Read More

Topics: Azure, Security, cloud security

Two self-inflicted “time bombs” that enabling your users to Work From Home (WFH) may cause.

Posted by Curtiss Adams on May 20, 2020 11:23:55 AM
Read More

Topics: cloud security

Ensuring Data Security and Regulatory Compliance in the Cloud

Posted by Brad Watson on Jan 28, 2019 11:30:09 AM

Most business solutions are migrating to the cloud due to the flexibility, scalability, and cost-saving features. However, while moving to the cloud, data, systems, and services can be exposed to serious security and compliance challenges.

When moving data to the cloud, it is necessary to ensure that your information and data remain compliant with the laws and regulations of your industry.

Read More

Topics: Azure, Digital Transformation, cloud security

Content not found