Cybersecurity Blog
Latest from Blog
Endpoint Investigation, Invasive or Invaluable?
Give analysts agency wihout losing availability. Microsoft Defender for Endpoint (MDE) has live response options that allow security analysts using...
Is “Always Encrypted” Actually Always Encrypted?
Secure your data with functionally always encrypted. Azure allows their database users to encrypt their data with “always encrypted”. This...
Managing Timestamps in Sentinel
Turn table data into an investigation timeline. Microsoft Sentinel uses raw table data to represent what is happening during an...
Why are There So Many Impossible Travels in MCAS?
Discern true and false positive impossible travels. Analysts at CyberMSI have been noticing a significant increase in MCAS impossible travel...
Implement CIS Controls in Microsoft Cloud Products
Secure your cloud environment with all 20 CIS controls. The Center for Internet Security (CIS) is a major player in...
Read Microsoft Sentinel Playbooks Like A Pro
Understand Microsoft Sentinel automation by breaking it down into parts. When an Azure user opens a logic app like Microsoft...
All Microsoft 365 Defender Permissions Menu Locations
Managing permissions in all 4 Microsoft 365 Defender platforms. The menus for granting permissions in the Microsoft 365 Defender platforms...