[blog]

The authority on identity and security in Microsoft

Does securing your business keep you up at night? Sleep better staying in the know – read our experts unique takes on trends in cybersecurity. 

As organizations embrace cloud technologies and modernize their authentication methods, they must still maintain support for their legacy on-premises environments. A key step in transitioning to a cloud-first strategy is [...]

Trying to understand the differences between Microsoft Entra Plan 1 (P1) and Plan 2 (P2)? You’re not alone. Many organizations are tasked with understanding how each of these identity management [...]

The Kerberos authentication protocol, developed by the Massachusetts Institute of Technology (MIT), is an often-discussed topic because it is a stronger form of authentication when compared to the NT Lan [...]

When you hear the phrase “art of deception,” you might think of street magicians dazzling crowds of onlookers with their sleight of hand tricks and illusions. For me, it brings [...]

One of the most dangerous phases of a cyberattack is privilege escalation, which involves a bad actor getting access to network resources via compromised user accounts and then elevating the [...]

As organizations increasingly embrace digital transformation, electronically stored data is a company’s most valuable asset. Unfortunately, it’s also one of the most vulnerable. Whether it’s customer records, financial data, intellectual [...]

This blog post is a follow up to my previous post on leveraging Azure Blob Storage to serve HTTP certificate revocation lists (CRLs). If you have not already done so, [...]

Microsoft’s Active Directory (AD)—released in 1999 as part of Windows 2000 Server Edition—is currently the most popular directory service for Windows domain networks. AD has evolved and matured over the [...]

Maintaining security in a Windows environment is important to reduce the risk of bad actors being able to cause harm to an organization. Although Windows is built to be secure [...]

Remote Desktop Gateway (RDG) is a widely deployed Windows Server Role that allows secure remote access to a protected resource (e.g. a Windows Server via Remote Desktop Protocol (RDP)). There [...]

HR-driven provisioning is a capability of Entra ID that allows data from Human Resource (HR) systems to be used to create and update accounts in Entra ID or Active Directory. [...]

Public key infrastructure (PKI) is the bedrock of modern telecommunications. It is a foundational technology to uniquely identify clients and facilitate their secure transmission and storage of data between public [...]