Agent-less Models for Security are the Wrong Approach
Let me drop a bomb on you: Cybersecurity is a complicated issue. Now that isn't exactly a new concept. What is newer these days is how encompassing the cloud ecosystem [...]
Let me drop a bomb on you: Cybersecurity is a complicated issue. Now that isn't exactly a new concept. What is newer these days is how encompassing the cloud ecosystem [...]
Introduction Senserva is excited to announce the newest release of the Senserva engine which includes the ‘Applications Simulator’. The Applications Simulator focuses on all aspects of applications (app registrations) in [...]
We just put out a guest blog on the Microsoft TechCommunity Sentinel Blog, be sure to check it out! Great Collaboration with the team there and more to come!
With great pleasure, we would like to introduce the open-source version of Senserva's Azure Active Directory toolkit to help you secure your environment built on top of Microsoft Sentinel. Senserva [...]
ST. PAUL, MN., December 8, 2021 -- Senserva, LLC, a leading cloud security provider that produces enhanced visibility, analytics, and risk prioritization of security, entitlement/Identity and compliance, announced it has [...]
The pace and diversity of cyberattacks are on the rise. Recently, we have seen high-profile incidents of ransomware, including the recent Colonial Pipeline attack, and a new vector of attacks [...]
This blog is written by Jan Bakker. When organizations have implemented Azure Active Directory Conditional Access, the real game is on. How to make sure that you stay in control [...]
Organization grow and change their needs as time goes on. This is a given for any company in today's world. As we shift more into a cloud-first landscape, your identity [...]
Introduction Every organization will be implementing custom app registrations sooner or later, either for automation or to integrate third party applications. As explained in previous blogs, there is an important [...]
Azure has many features to help secure your use of the cloud. Several methods like Multi-Factor Authentication are standard to any IT workload. Some are less well-known, such Continuous Access [...]