November 23, 2022

Build A Winning Case for Data Governance – Part 1

Introduction: The Significance of Governing Data Data is an invaluable asset to any organization and vital to business development and organizational success. Any business [···]

Read More

November 17, 2022

The Easiest Approach to Creating A Robust Data Governance Framework

Introduction: More often than not, the demand for data governance is prompted by a specific initiative, such as regulatory requirements. A data governance framework [···]

Read More

November 10, 2022

Top 3 Ways to Launch A Successful Data Governance Strategy

Introduction: The negative impact of not managing sensitive data properly can be damaging. You are aware of the risks and so you have embarked [···]

Read More

October 06, 2022

Microsoft Purview Information Protection – Taking You Beyond Compliance 

Introduction: An organization’s most valuable asset is its data and Microsoft Purview Information Protection is the best defense to secure it. Innovation becomes challenging [···]

Read More

October 05, 2022

Data Governance – Why Is It Essential to Your Business

Introduction: Companies produce 5 quintillion bytes of data every day – a breathtaking number with – for the uninitiated — 18 trailing zeroes. Given [···]

Read More

September 13, 2022

Avoid MIP Outages by Ensuring Recommended RMS Service URLs Are Allowed

Introduction: Working with Microsoft Information Protection (MIP) deployment across organizations requires a well-thought-out strategy and following certain best practices. MIP leverages Azure RMS service [···]

Read More

June 24, 2022

Microsoft Defender for Endpoint & EDR: How It Helps Secure Your Endpoints & Organization? – Part 2

Introduction: In Part 1 of this blog series, we explained in detail what Endpoint Detection & Response (EDR) is and the importance of the [···]

Read More

June 17, 2022

Four Key Trends in Semiconductor Industry that Result in Data Security Challenges

Introduction: “If data is the new oil, Semiconductor is the new steel,” says James Andrew Lewis, Sr. Vice President & Director of Strategic Technologies [···]

Read More

June 09, 2022

Protecting Intellectual Property Across Supply Chains – Part 2

Introduction: In my previous blog post, I discussed the challenges of information protection across the supply chain. In this post, I will discuss more [···]

Read More

June 07, 2022

Protecting Intellectual Property Across Supply Chains – Part 1

Introduction: In the past few months, I have received several requests from organizations to help protect intellectual property across supply chains. This prompted me [···]

Read More

April 25, 2022

Three Ways to Prevent An Okta-Like Breach in Azure Active Directory

Introduction: We have seen in the latest news how vendor and supplier attacks have penetrated large companies like Okta. This has prompted many customers [···]

Read More

April 19, 2022

Microsoft Defender for Endpoint & EDR: How can It Help Secure Your Endpoints & Organization– Part 1

Introduction: After a major security product re-brand and feature/functionality enhancements, the Defender Suite takes shape: Defender Branding Updates New Name Old Name Microsoft 365 [···]

Read More

April 11, 2022

How to Switch ServiceNow from OKTA to Azure Active Directory

Introduction: Building a fortress around your company’s mission-critical data is the ultimate goal for any mild-mannered IT executive. But who is playing the role [···]

Read More

February 10, 2022

Microsoft 365 Modern Workplace & Security Management Essentials

Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. [···]

Read More

January 11, 2022

Microsoft Endpoint Manager (MEM) – What Is It & How Can It Help Secure Your Endpoints?

Introduction: After a swift product shuffle and re-branding we find Microsoft Endpoint Manager emerging to rise up the Gartner ranks to become the leader [···]

Read More

December 28, 2021

Why Do Many Digital Rights Management Projects Fail After POC?

Introduction: The globe is littered with opportunists with sticky fingers – and it’s never been more prevalent than in today’s digital landscape. Whether it’s [···]

Read More

August 26, 2021

Part III : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center

Introduction: In Blog 1 of this series, Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center- Part 1, we went through in [···]

Read More

August 19, 2021

Part II : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center

Introduction: We hope you had the chance to read our previous blog on the subject, Security Assessment and Solutioning with Microsoft 365 Security and [···]

Read More