[blog]

The authority on identity and security in Microsoft

Does securing your business keep you up at night? Sleep better staying in the know – read our experts unique takes on trends in cybersecurity. 

The Windows GPUpdate command lets administrators push configuration changes on demand—no reboot, no guessing. What You’ll Read A plain-English definition of GPUpdate and where it fits into Group Policy processing [...]

Implementing secure access in an organization can be compared to taking on a home renovation project. There are times when rolling up your sleeves and doing it yourself (DIY) makes [...]

For many enterprises, applications are making great progress moving to the cloud, but user identities often remain anchored in on-premises systems. Critical applications remain tied to legacy authentication protocols that [...]

Active Directory (AD) continues to be one of the most targeted components in enterprise environments. Whether it’s credential theft, lateral movement, or exploitation of legacy protocols, attackers frequently focus on [...]

Microsoft Entra Internet Access is Microsoft’s modern solution for secure, identity-aware access to SaaS applications and other Internet resources. Built into the Microsoft Entra ecosystem and aligned with Microsoft’s Zero [...]

Defending against cyber-attacks is an ongoing exercise for all organizations, as the volume of security breach attempts appear to be increasing. A Q1 2025 study by Check Point Software revealed [...]

If you’ve ever managed user accounts in a growing organization, you know the hassle of keeping identities in sync across systems. One small mismatch can lead to access issues, security [...]

The most significant AI security risks in your organization don’t come from careless interns or external threats. They come from your highest performers—employees who understand your systems best, move fastest, [...]

Every security team has lived through Shadow IT. First, it was cloud storage with Dropbox, then Box, then Google Drive. Tools appeared faster than procurement could react, and security teams [...]

Many organizations first learn about the Active Directory (AD) Protected Users group during an external audit or penetration test. It often begins with an auditor asking, “Why haven’t you placed [...]

I love to fish. There is nothing more relaxing to me than being on a quiet pond in the early morning hours as the rising sun slowly burns off the [...]

As industries evolve, so too does the implementation of their existing technologies. Public Key Infrastructure (PKI) is no different. Many organizations are preparing for the widely anticipated Client Authentication EKU [...]