Blog
Gursimran Singh
-
Jul 18, 2023
Improving the security posture of your organization starts with each of your employees. Regularly providing your employees with consistent, high-quality security awareness training is a basic requirement to…
Blog
Sumit Kumar Mahajan
-
Jun 29, 2023
As cyber threats continue to evolve and grow in sophistication, organizations need to constantly evaluate and optimize their cybersecurity investments to stay ahead of the curve. One solution…
Blog
Priyam Ghosh
-
Jun 23, 2023
There is a critical security vulnerability found in the Credential Security Support Provider protocol (CredSSP) that could potentially lead to remote code execution. This vulnerability allows an attacker…
Blog
Niraj Tenany
-
May 24, 2023
While it's generally advisable for organizations and their CISOs (Chief Information Security Officers) to prioritize data security, it's important to acknowledge that there may be various factors or…
Blog
Tamara Mallory
-
Jan 12, 2023
Introduction Now that remote work has become the new norm, it is the right time for your organization to invest in virtual desktops for your workers. Microsoft’s virtual…
Blog
Sridhar Chalapathy
-
Oct 6, 2022
Introduction: An organization’s most valuable asset is its data and Microsoft Purview Information Protection is the best defense to secure it. Innovation becomes challenging when you do not…
Blog
Gursimran Singh
-
Sep 13, 2022
Introduction: Working with Microsoft Information Protection (MIP) deployment across organizations requires a well-thought-out strategy and following certain best practices. MIP leverages Azure RMS service to manage permission and…
Blog
Steve Andrews
-
Jun 24, 2022
Introduction: In Part 1 of this blog series, we explained in detail what Endpoint Detection & Response (EDR) is and the importance of the powerful Defender for Endpoint…
Blog
Niraj Tenany
-
Jun 17, 2022
Introduction: “If data is the new oil, Semiconductor is the new steel,” says James Andrew Lewis, Sr. Vice President & Director of Strategic Technologies Program at CSIS. It…
Blog
Steve Andrews
-
Apr 19, 2022
Introduction: After a major security product re-brand and feature/functionality enhancements, the Defender Suite takes shape: Defender Branding Updates New NameOld NameMicrosoft 365 DefenderMicrosoft Threat ProtectionDefender for EndpointMicrosoft Defender…
Blog
Arghya Roy
-
Feb 10, 2022
Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest…
Blog
Steve Andrews
-
Jan 11, 2022
Introduction: After a swift product shuffle and re-branding we find Microsoft Endpoint Manager emerging to rise up the Gartner ranks to become the leader in Unified Endpoint Management…