2 min read
vCIO Playbook - BEC - Business Email Compromise
Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...
2 min read
Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...
1 min read
New Features in CloudCapsule Premium We've been listening to your feedback and we're excited to announce new features now available in CloudCapsule...
2 min read
Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...
3 min read
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...
3 min read
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of governance, and...
1 min read
Cloud Capsule @ Right of Boom Our team had an amazing time at Right of Boom in Las Vegas, connecting with partners, making new friends, and...
1 min read
We are pleased to announce the availability of the NIST CSF 2.0 Baseline on the CloudCapsule platform.
2 min read
We're excited to share some recent updates with you and preview some upcoming features. We have quite a few this month, so please check them out!...