Cybersecurity Blog
Latest from Blog
Using Microsoft MCAS Effectively
How to Investigate Cloud Incidents in Microsoft MCAS Microsoft Cloud App Security (MCAS) is a Cloud Access Security Broker (CASB) service...
Are You Challenged with the Microsoft Sentinel Investigation Graph?
Use a focused methodology to avoid getting lost. Microsoft Sentinel’s investigation graph uses nodes to represent security data, and those...
Accelerating Zero Trust Security (ZTS) – Part 2
How to prioritize your zero trust security (ZTS) initiatives In part 1 of this blog post on zero trust security...
Accelerating Zero Trust Security – Part 1
How to prioritize your zero trust security initiatives We’re seeing major technological shifts such as work-from-home, automation, robotics, IoT, etc....
Is threat hunting a waste of time?
It can be unless you incorporate these strategies Many organizations are adopting regular cybersecurity threat hunting exercises as part of...
Is zero trust security an approach, architecture or new tech?
Yes—and how to unravel it for your organization Lately, the topic of zero-trust Security (ZTS) is one that we at...
Are you primed for success?
Why teaming successfully with your cybersecurity services provider is critical Henry Ford famously said, “Coming together is a beginning. Keeping...