8 min read
Token Theft Playbook: Proactive Protections
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC...
1 min read
Daniel Johnson
:
May 8, 2025 2:14:28 PM
Based on client feedback, we've expanded our datacenter presence to include an Australian location for partners and clients in need of data sovereignty for that region. Partners can choose the Australian datacenter when signing up:
For partners with an existing subscription in the US or EU datacenters who wish to migrate to the AU datacenter, please sign-in to the AU datacenter and then submit a request via our website chat. You will be prompted for a support code from the AU account, which you can find in the Admin section. Migration requests are typically serviced in 48-72 hours.
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security. The ACSC recommends all Australian organizations implement the Essential Eight mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline.
The baseline, known as the Essential Eight, are foundational cyber security measures that make it much harder for adversaries to compromise systems. The key mitigation strategies of Essential 8 are:
To compliment the launch of our Australian datacenter, we're proud to announce the availability of the Essential 8 baseline within CloudCapsule Essentials and CloudCapsule Premium. Now partners and enterprise clients can leverage CloudCapsule to obtain the insight and remediation recommendations needed to comply with Essential 8 controls.
Our assessment automates over 70 of the controls across the Maturity groups:
We'll be hosting an exclusive, partner-only session for Australian and New Zealand where we'll discuss the latest features of CloudCapsule Premium, our new Essential 8 Baseline, and the launch of our Australian Datacenter.
🗓️ Thursday, June 5, 2025
⌚ 9AM AEST
Session highlights include:
Advanced resgisration is available today, so reserve your VIP seat today!
8 min read
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC...
14 min read
Microsoft 365 Updates for May 2025 Check out the latest updates from Microsoft including Teams, Outlook, Microsoft 365 Apps, Entra, Copilot,...
4 min read
As MSPs craft their go-to-market strategy focused on Microsoft 365, cybersecurity services, and client engagement, it is beneficial to look...