April 25, 2022
287 Views

Three Ways to Prevent An Okta-Like Breach in Azure Active Directory

Introduction: We have seen in the latest news how vendor and supplier attacks have penetrated large companies like Okta. This has prompted many customers [···]

Read More

April 19, 2022
331 Views

Microsoft Defender for Endpoint & EDR: How can It Help Secure Your Endpoints & Organization– Part 1

Introduction: After a major security product re-brand and feature/functionality enhancements, the Defender Suite takes shape: Defender Branding Updates New Name Old Name Microsoft 365 [···]

Read More

April 11, 2022
467 Views

How to Switch ServiceNow from OKTA to Azure Active Directory

Introduction: Building a fortress around your company’s mission-critical data is the ultimate goal for any mild-mannered IT executive. But who is playing the role [···]

Read More

February 10, 2022
856 Views

Microsoft 365 Modern Workplace & Security Management Essentials

Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. [···]

Read More

January 11, 2022
810 Views

Microsoft Endpoint Manager (MEM) – What Is It & How Can It Help Secure Your Endpoints?

Introduction: After a swift product shuffle and re-branding we find Microsoft Endpoint Manager emerging to rise up the Gartner ranks to become the leader [···]

Read More

December 28, 2021
795 Views

Why Do Many Digital Rights Management Projects Fail After POC?

Introduction: The globe is littered with opportunists with sticky fingers – and it’s never been more prevalent than in today’s digital landscape. Whether it’s [···]

Read More

August 26, 2021
474 Views

Part III : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center

Introduction: In Blog 1 of this series, Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center- Part 1, we went through in [···]

Read More

August 19, 2021
479 Views

Part II : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center

Introduction: We hope you had the chance to read our previous blog on the subject, Security Assessment and Solutioning with Microsoft 365 Security and [···]

Read More

August 04, 2021
3067 Views

[Updated] Microsoft Information Protection Best Practices- Part 2

Summary: As the COVID-19 pandemic has been dramatically altering typical business strategies, the coming decade will be marked by significant transformation worldwide. Data protection [···]

Read More

July 21, 2021
1681 Views

Setting up Azure API Management Service

This article is about utilizing Azure API Management Service being used in a context and need was felt when a situation was experienced while [···]

Read More

July 01, 2021
2387 Views

Four Reasons to Migrate Okta to Azure Active Directory

Organizations around the world have accelerated digital transformation efforts to rapidly enable a remote workforce. As more and more employees access applications using their [···]

Read More

April 14, 2021
4683 Views

Using Azure Key Vault and Secrets in Custom Application

Introduction: In an integrated Azure world, applications need to interact with each other often with highly empowered credentials that cannot be compromised at any [···]

Read More

January 27, 2021
3683 Views

How to Avoid Throttling or Getting Blocked in SharePoint Online using SharePoint App Authentication

Overview Throttling in SharePoint Online is annoying, as it not only delays the process, but also SharePoint Online may completely block the process if [···]

Read More

December 02, 2020
840 Views

Security & Compliance – Microsoft Teams Retention & eDiscovery – Part 2

In this part 2, I will take you through creating the minimum retention policies to cover your organization’s Microsoft Teams data. Remember Teams is [···]

Read More

November 26, 2020
1377 Views

Part I : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center

Introduction This is a deep dive into Microsoft 365 Security and Compliance center OOTB reports and more importantly what potential solutions may be evolved [···]

Read More

November 18, 2020
1279 Views

AIP Error Part III – Issues with Relabelling of Documents in SharePoint/ OneDrive using App Authentication

Introduction Remember we spoke about the incompleteness of the “Sensitivity” column while dealing with labelling of files in an MIP integrated SPO/OneDrive document library? [···]

Read More

October 06, 2020
1998 Views

Security & Compliance – Microsoft Teams Retention & eDiscovery – Part 1

Microsoft Teams has an astonishingly steep take-up/adoption curve with the current remote workers situation. Teams is referred to a “The Hub of Office 365” [···]

Read More

September 29, 2020
1401 Views

AIP Error Part II-Template Based Label remains sticky in Sensitivity Column

Introduction I found more to this “Sensitivity” column beyond what I discussed last time. There, we talked about how the sensitivity column does not [···]

Read More