Microsoft Entra certificate-based authentication

This post stands out because I’ve recently experienced a profound shift. It’s as if someone suddenly pulled back the blinds, and I’m seeing everything in a whole newperspective. You see, I’ve been navigating through the murky waters of cybersecurity, constantly dealing with passwords and avoiding phishing emails. Kind of like playing dodgeball where the stakes … Read more

How to manage Entra ID Stale Devices

More often than not, when we refer to Identity lifecycle management, it’s usually in connection with users in our tenants and almost never devices associated with these user profiles. An identity lifecycle refers to the entire process that begins when a user’s digital identity is created and assigned access to resources. This also includes physical … Read more

Checklist to protect your Microsoft 365 Identities

As Microsoft 365 evolves with the integration of new features such as Microsoft Co-pilot, and Premium features spanning across different services, the threat of sophisticated cyberattacks is escalating. Hence, it is super important that we fully comprehend the security measures available within Microsoft’s ecosystem, and use these to our advantage to protect our Microsoft 365 … Read more

Cloud Misconfigurations and Attack Vectors

Picture a swiftly expanding tech start-up company, Innovatech, shifting its operations to the cloud so as to optimise the scalability and efficiency of cloud computing. The switch was painless and the gains were immediate. However, after a few months Innovatech suffered from a bad data breach. What was its source? It was simply an oversight … Read more

Zero Trust Architecture in Microsoft Azure

  In today’s digital age, marked by the growing sophistication of security breaches and cyberattacks, the conventional ‘trust but verify’ model in cybersecurity seems obsolete. That’s where the Zero Trust Architecture comes into play, especially when in cloud environments like Microsoft Azure. As someone embedded in the world of cloud security, I’ve seen firsthand how … Read more

AI’s role in Cybersecurity

In the ever-evolving landscape of technology, it’s becoming increasingly evident that artificial intelligence (AI) is set to make a profound impact on our daily lives. If you once questioned whether AI was just a fleeting trend, recent breakthroughs have likely erased those doubts. The rise of innovative AI tools, such as the impressive generative model … Read more

Unified Portal: Defender XDR, Security Copilot & Sentinel

Managing security in multi-cloud environments just got easier, thanks to Microsoft’s latest update. They’ve introduced a unified experience in the Microsoft Defender portal, combining SIEM (Security Information and Event Management) and XDR (Extended Detection and Response). Say goodbye to navigating between SIEM, EDR, and Threat Intelligence systems. Now, all your security data is accessible in … Read more

Hoxhunt – Phishing Training

I often write about various techniques we can adopt to secure identities and uphold security best practices. This includes implementing authentication methods like Conditional Access policies and emphasizing the significance of companies adopting and maintaining the principle of Least Privilege, not to forget the importance of Zero Trust. These measures play a vital role in … Read more

Microsoft Entra and Security Copilot

Microsoft Entra serves as a comprehensive tool designed to protect organizations from cyber threats, provide secure access to all resources, and enable employees to work from anywhere. The recent unveiling of exciting new features and capabilities at Microsoft Ignite 2023 signifies Microsoft’s commitment to enhancing secure access in the era of artificial intelligence. Here are … Read more

Enhancing Your Security with Microsoft’s New Managed Conditional Access Policies

  In a world where cyberthreats are ever-evolving, security is paramount. And Microsoft is stepping up to the plate by introducing a set of new Microsoft-managed Conditional Access policies designed to bolster your defense against potential cyberattacks. These policies are part of a broader initiative aimed at fortifying security and ensuring the protection of your … Read more