Blue Team Blog

Secure your Microsoft 365 tenant
and grow your security practice.

 

 

  Subscribe Today

Get the latest info on CloudCapsule,
Microsoft 365, cybersecurity trends,
CIS, NIST, and more.

2 min read

vCIO Playbook - BEC - Business Email Compromise

Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and malware attacks. Business email compromise (BEC) occurs when cybercriminals impersonate trusted leaders to...

Read More

2 min read

Protecting Corporate Data on Personal Cell Phones

If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...

Read More

1 min read

CloudCapsule Premium Now Available

New Features in CloudCapsule Premium We've been listening to your feedback and we're excited to announce new features now available in CloudCapsule...

Read More

2 min read

Data Protection with Guest Users in Microsoft 365

When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...

Read More

2 min read

Automating Vendor Onboarding Requests

Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...

Read More

3 min read

Top policies for securing device registration in Microsoft 365

By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...

Read More

3 min read

Build a Governance Layer for Application Inventory Management + Free Templates

Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of governance, and...

Read More
Extend your Entra log retention to gain valuable insight on threat behavior

3 min read

Retaining Entra Sign-in Logs Beyond 30 Days

In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and incident...

Read More

3 min read

Secure Application Management

How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like most organizations,...

Read More

Incredible Insights.
Amazingly Affordable.

$250/Month
Unlimited tenants. Up to 1K users per tenant.
Cancel anytime. No long-term contracts.