- Services
-
- Who we are
- Resources
-
-
- Stay up-to-date
—
read our experts' unique takes on trends in cybersecurity.
-
- Explore our resources for advice on boosting your organization's security.
-
-
- Get in touch
Category: Compliance
As organizations increasingly embrace digital transformation, electronically stored data is a company’s most valuable asset. Unfortunately, it’s also one of the most vulnerable. Whether it’s customer records, financial data, intellectual [...]
This blog post is a follow up to my previous post on leveraging Azure Blob Storage to serve HTTP certificate revocation lists (CRLs). If you have not already done so, [...]
Microsoft’s Active Directory (AD)—released in 1999 as part of Windows 2000 Server Edition—is currently the most popular directory service for Windows domain networks. AD has evolved and matured over the [...]
Maintaining security in a Windows environment is important to reduce the risk of bad actors being able to cause harm to an organization. Although Windows is built to be secure [...]
Remote Desktop Gateway (RDG) is a widely deployed Windows Server Role that allows secure remote access to a protected resource (e.g. a Windows Server via Remote Desktop Protocol (RDP)). There [...]
HR-driven provisioning is a capability of Entra ID that allows data from Human Resource (HR) systems to be used to create and update accounts in Entra ID or Active Directory. [...]