Blog

Tag: Information Protection and Compliance

Blog
Matthew Maher - Sep 26, 2023

Top 7 Questions on How to Protect Your Business Data

In today's fast-paced digital landscape, staying ahead of cybersecurity threats is paramount. Microsoft's suite of security solutions plays a pivotal role in safeguarding your organization. To help you…
Blog
Arghya Roy - Aug 23, 2023

5 Steps for Purview Security Best Practices 

Introduction: This is the third blog in a series about Microsoft Information Protection best practices that began with our first two blogs. Since Microsoft Purview is continually being…
Blog
Priyam Ghosh - Jun 23, 2023

[Updated] CredSSP Encryption Oracle Remediation

There is a critical security vulnerability found in the Credential Security Support Provider protocol (CredSSP) that could potentially lead to remote code execution. This vulnerability allows an attacker…
Blog
Manish Athavale - May 11, 2023

Securely Share Sensitive Data with Your Supplier’s Supply Chain 

In today's interconnected business landscape, a typical manufacturing supply chain operates as a complex network involving multiple stakeholders. This network encompasses manufacturers, suppliers, distributors, logistics providers, and other…