
2 min read
Data Protection with Guest Users in Microsoft 365
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the mix. Guest users can:
Read More2 min read
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the mix. Guest users can:
Read More2 min read
Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...
3 min read
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...
3 min read
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of governance, and...
3 min read
In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and incident...
3 min read
How many of you can confidently say that your business maintains a centralized and approved application inventory? If you’re like most organizations,...
1 min read
Cloud Capsule @ Right of Boom Our team had an amazing time at Right of Boom in Las Vegas, connecting with partners, making new friends, and...
1 min read
The CloudCapsule team will be hitting the road in the new year, with our first stop being Right of Boom 2025 in Las Vegas, Feb 19-21! Please join us...
3 min read
Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know what, we are just going to...
1 min read
We are pleased to announce the availability of the NIST CSF 2.0 Baseline on the CloudCapsule platform.