Security Blogs
ThreatDefender:
-A Cybersecurity Close Call: How We Detected and Contained the Threat
Intune:
-What is the Microsoft Intune Suite? How Is It Different From Intune?
-Microsoft Intune Multi-Admin Approval
-How to Deploy Microsoft Intune Endpoint Privilege Management
-Configure Location Services via Intune: Microsoft Teams
-Intune Windows Autopilot Device Preparation
Entra Suite:
-Retiring Active Directory for Infrastructure with Entra ID
-MFA Alone Is Still Not Enough in 2025—Here’s What to Do
-Enhance Your Security with the New Microsoft Entra Suite
Data Governance:
-Hierarchy of Data Protection for Copilot: Go Beyond Cleanup to Ongoing Governance
-Microsoft Label Groups: What’s Changing and How to Prepare
-Hierarchy of Data Protection for Copilot: Reduce Oversharing Risk
-Purview Secure by Default: Phase 4 – Strategic Data Governance
-Purview Secure by Default: Phase 3 – Optimized Auto-Labeling
-Purview Secure by Default: Phase 2 – Managed
-Purview Secure by Default: Phase 1 – Foundational
-Purview Secure by Default: Jumpstart Your Data Governance
-Achieving Successful Data Governance Is More Organizational Than Technical
-Use Purview DLP Simulation Mode to Understand PII Risks
-What Should I Do with These DLP Alerts, Anyway?
-Purview’s New AI Hub: Reduce AI Risks, Improve AI Visibility
-Dive Into Business Processes to Improve Data Governance and AI Efforts
-Executive Considerations for Data Governance with Microsoft Purview
-Purview Insider Risk Management: How to Capture Forensic Evidence on Intune Enrolled Devices
-Block Top-Level Domains with Intune and Windows Firewall Policy
-How Data Archival Brings Stronger Data Governance
Incident Response:
-Crowdsourced Incident Response Plan Tabletop Exercise Results
-Incident Response Plans: What Are They and Why Do They Matter to Your Organization?
-The Case for Tabletop Exercises in Incident Response Planning
vCISO
-Virtual CISO – An appealing alternative to CISO
Zero Trust
-Security Monitoring in a Zero Trust Model
-Proper Identity Monitoring in a Zero Trust Environment
-Streamline Entitlements and Access Reviews in a Zero Trust Model
-Limiting Service Accounts in a Zero Trust Model: Mastering Cloud Security
-Journey to Zero Trust: 2025 Update
-Device Management Best Practices in a Zero Trust Model: Mastering Cloud Security
-Zero Trust and Putting Identity First
MISC
-OAuth Phishing via Microsoft Teams: Bypassing MFA and Cloud Defenses in a No-Endpoint Attack
-Understanding Identity Provider Chaining for Visibility and Reporting
-Using SharePoint Advanced Management to Improve Governance and Security
-MFA Alone Is Still Not Enough in 2025—Here’s What to Do
-Cloud Access Security Brokers: Mastering Cloud Security
-Privileged Identity Management Best Practices: Mastering Cloud Security
-Summarizing Digital Defense Reports for 2024
-Cloud Identities and Security
-Implementing CISA’s SCuBA Project In Your Cloud