Monitoring Conditional Access. It’s harder than you think.
This blog is written by Jan Bakker. When organizations have implemented Azure Active Directory Conditional Access, the real game is on. How to make sure that you stay in control [...]
This blog is written by Jan Bakker. When organizations have implemented Azure Active Directory Conditional Access, the real game is on. How to make sure that you stay in control [...]
(From our guest and good friend, Cameron Fuller and his detailed Azure Sentinel Blog) Welcome to the “Introducing” series (check here for the full list of blog posts in this series). In [...]
https://www.getrevue.co/profile/AzureSentinelToday/issues/azure-sentinel-this-week-issue-14-626325 ... Secondly, I want to highlight something that should be of interest to anyone that’s been in the security biz for any length of time. Anyone remember the name Shavlik? [...]
From our good partner Jos Lieben. Check out his work at https://www.lieben.nu/: An Azure App Registration is a powerful tool available to Microsoft 365 users. If not secured correctly, [...]
Traditional Tokens Tokens are the core of API security on both Cloud and Kubernetes . (aka OAuth 2.0 Authorization) Since APIs most often give full read/write access to all things [...]
When recently overviewed two key items in Microsoft 365 user (IAM) security: PIM and Conditional Access. Another big part of AAD is the monitoring and response of Risky Users via [...]
In the wake of the Solorigate breach, a huge emphasis has been placed on the security of the Applications and Service Principals in your Microsoft 365 environment. Many recommendations coming [...]