Blog
Introduction If you browse Reddit or Microsoft Tech Community, one theme is obvious: Implementing Zero Trust is WAY harder than it looks on a slide deck. Admins often…
Subhendu Das
·
Jan 14, 2026
Blog
Introduction 2025 is a pivotal year for identity security. AI that creates content and autonomous agents have made identity attacks more powerful. These attacks now happen quicker, on…
Subhendu Das
·
Dec 1, 2025
Blog
Identity as the New Perimeter The security landscape has shifted. According to the Verizon 2024 Data Breach Investigations Report, 74% of breaches involve the human element—stolen credentials, phishing,…
Matthew Maher
·
Nov 5, 2025
Blog
Introduction Agentic AI and conversational AI present exciting opportunities to transform how organizations conduct and manage access reviews. Here’s a breakdown of how to use Agentic AI in…
Niraj Tenany
·
Jul 15, 2025
Blog
Introduction In this blog, I share details on how to go about initiating an access review and managing the initiative. To find out more about access reviews, you can…
Niraj Tenany
·
Jun 18, 2025
Blog
Introduction IGA stands for Identity Governance and Administration. It's a core component of identity and access management (IAM) that focuses on managing digital identities and their access rights…
Niraj Tenany
·
Jun 11, 2025
Blog
Introduction On April 19, 2025, a Microsoft Lockout Incident occurred when organizations faced mass account lockouts due to the deployment of Microsoft Entra ID's new MACE detection App.…
Priyam Ghosh
·
Apr 22, 2025
Blog
Introduction In today's digital world, mobile devices are vital in every sector. Efficient management of these devices is key to a smooth operation experience. Securely handling a large…
Priyam Ghosh
·
Dec 17, 2024
Blog
Introduction USB drives, while convenient, pose a significant security risk, as they can easily introduce malware or facilitate data exfiltration. For organizations using Microsoft Intune and Microsoft Defender,…
Subhankar Bhattacharjee
·
Sep 11, 2024
Blog
Introduction The modern mobile-centric business landscape implies that safeguarding sensitive corporate data is a top priority. Employees have access to more devices to access company resources than before.…
Subhankar Bhattacharjee
·
Aug 16, 2024
Blog
Introduction Let us start with the basic question: Is Entra ID the same as Intune? To answer this question, first think of Microsoft Intune and Microsoft Entra ID…
Om Prakash
·
Jul 12, 2024
Blog
Introduction In the intricate process of migrating to Microsoft Intune, a successful communication and support strategy, coupled with a robust implementation plan, is crucial for facilitating user adoption.…
Sumit Kumar Mahajan
·
Apr 12, 2024