8 min read
Token Theft Playbook: Incident Response
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...
8 min read
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...
3 min read
Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved...
1 min read
CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...
2 min read
Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...
2 min read
If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...
2 min read
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...
2 min read
Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...
3 min read
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...
3 min read
Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of governance, and...
3 min read
In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and incident...