Cybersecurity Blog

Latest from Blog

endpoint-investigation-invasive-or-invaluable

Endpoint Investigation, Invasive or Invaluable?

Give analysts agency wihout losing availability. Microsoft Defender for Endpoint (MDE) has live response options that allow security analysts using...
is-always-encrypted-actually-always-encrypted

Is “Always Encrypted” Actually Always Encrypted?

Secure your data with functionally always encrypted. Azure allows their database users to encrypt their data with “always encrypted”. This...
managing-timestamps-in-sentinel

Managing Timestamps in Sentinel

Turn table data into an investigation timeline. Microsoft Sentinel uses raw table data to represent what is happening during an...
why-are-there-so-many-impossible-travels-in-mcas

Why are There So Many Impossible Travels in MCAS?

Discern true and false positive impossible travels. Analysts at CyberMSI have been noticing a significant increase in MCAS impossible travel...
implement-cis-controls-in-microsoft-cloud-products

Implement CIS Controls in Microsoft Cloud Products

Secure your cloud environment with all 20 CIS controls. The Center for Internet Security (CIS) is a major player in...
read-azure-sentinel-playbooks-like-a-pro

Read Microsoft Sentinel Playbooks Like A Pro

Understand Microsoft Sentinel automation by breaking it down into parts. When an Azure user opens a logic app like Microsoft...
all-microsoft-defender-permission-menu-locations

All Microsoft 365 Defender Permissions Menu Locations

Managing permissions in all 4 Microsoft 365 Defender platforms. The menus for granting permissions in the Microsoft 365 Defender platforms...
why-are-there-4-different-azure-vm-security-extensions

Why Are There 4 Different Microsoft Defender for Cloud VM Security Extensions?

Use extensions to customize Microsoft Defender for Cloud VM security. Microsoft Defender for Cloud uses extensions to allow users to...
ad-domain-service-and-defender-for-identity-demystified

AD Domain Service and Defender for Identity Demystified

Understanding hybrid environment security with relative ease. Some members of an organization’s IT staff may be concerned about subjects like...

How Can We Help?

Scroll to Top