Article

Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK

[ARTICLE] Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK​ In Andy Schneider’s Practical365.com article, he outlines how you can use GitHub Copilot to convert Powershell scripts efficiently.   If you write PowerShell often, GitHub Copilot might be worth your while! Read the full article to learn why. Learn More [ARTICLE] […]

Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK Read More »

Source Control for Microsoft 365 Tenant Admins: Part III

[ARTICLE] This is the third and final article in a series covering Git-based Source Control for Microsoft 365 Tenant Admins by Andy Schneider from Ravenswood Technology Group.   The first article introduced source control and how to get started with Git. The second article focused on collaboration with other developers using Git.    In this article,

Source Control for Microsoft 365 Tenant Admins: Part III Read More »

Kensington’s Passwordless Spotlight featuring Ravenswood Technology Group

[ARTICLE] Kensington’s Passwordless Spotlight featuring Ravenswood Technology Group In this article, Kensington interviewed Miles Gratz from Ravenswood on his advice for organizations transitioning to passwordless and his recommended Kensington biometric security products. Learn More [ARTICLE] In this article, Kensington interviewed Miles Gratz from Ravenswood on his advice for organizations transitioning to passwordless and his recommended

Kensington’s Passwordless Spotlight featuring Ravenswood Technology Group Read More »

Three Steps to Harden Your Active Directory in Light of Recent Attacks

[ARTICLE] Three Steps to Harden Your Active Directory in Light of Recent Attacks In this article, Brian Desmond from Ravenswood Technology Group reflects on and summarizes the webinar he co-hosted with Sean Deuby and Ran Harel from Semperis “How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches,” where they discussed three of the most important preventative measures

Three Steps to Harden Your Active Directory in Light of Recent Attacks Read More »