" style="background-color: #2c3e50;">
 

Blogs

Managing Device Vulnerabilities - Part 2

Posted by Cliff Embry on Oct 5, 2022 12:26:15 PM
Read More

Topics: cloud security

Exchange Server Zero-day Vulnerabilities

Posted by Cliff Embry on Oct 1, 2022 9:30:00 AM
Read More

Topics: Security, cloud security, M365

Information Protection: The missing link

Posted by Cliff Embry on Jun 29, 2022 10:33:11 AM
Read More

Topics: Security, cloud security, M365

Microsoft Follina and Dogwalk Zero-Day Protection

Posted by Cliff Embry on Jun 10, 2022 6:30:40 PM

Defend against Follina and DogWalk

On May 30th, 2022, Microsoft issued CVE-2022-30190

This was in reference to the Follina, the first zero-day. The guidance reads:

"A remote code execution vulnerability exists when MDST is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights."

Read More

Topics: Security, cloud security, M365

Conditional Access 101 | Why you need it and how to use it

Posted by Curtiss Adams on Apr 5, 2022 8:30:00 AM
Read More

Topics: Security, cloud security

Microsoft Purview Information Protection Demystified

Posted by Cliff Embry on Mar 23, 2022 2:00:58 PM
Read More

Topics: Security, cloud security

Shields Up Security Guidance Issued | How to prepare for state-sponsored cyber threats

Posted by Cliff Embry on Mar 7, 2022 12:28:41 PM
Read More

Topics: Security, cloud security, M365

Improve Your IoT, OT, and Firmware Security

Posted by Curtiss Adams on Jul 27, 2021 11:49:08 AM
Read More

Topics: Security, IoT, cloud security

Why are landing zones essential to Azure success?

Posted by Eric Rhoads on Jan 6, 2021 10:30:00 AM
Read More

Topics: Azure, Business Process, cloud security

Auditing role assignments with Privileged Identity Manager (PIM)

Posted by Tom Kozel on Oct 19, 2020 10:00:00 AM
Read More

Topics: Azure, Security, cloud security

Content not found