Gone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.
Bad actors that have breached a system can adding fake devices to bypass multifactor authentication – here’s how to stop them
When two companies merge, a top-to-bottom assessment of settings for Active Directory forests with trusts can eliminate headaches and create a more secure environment
Many bad actors act strike quickly, but there are plenty of attackers who can lurk in systems for a long time before striking. Here’s what a recent attack teaches us about a long defense.
Microsoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.
A Chinese hacker’s intrusion though a US government Microsoft 365 account is a wake-up call to review your current logging stance.
It’s not easy to detect and defend against attackers who can lurk in Windows systems, mimicking functions native to the operating system, but there are practical measures that will help thwart them.
Switching from legacy Active Directory systems to the cloud can improve versatility but hybrid systems need special attention to ensure they’re still secure.