2 min read
Essential 8 with Microsoft 365
In this post, we’ll explore how the Australian Cyber Security Centre’s Essential Eight framework maps directly to Microsoft 365 security controls—and...
2 min read
In this post, we’ll explore how the Australian Cyber Security Centre’s Essential Eight framework maps directly to Microsoft 365 security controls—and...
4 min read
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC incidents as...
8 min read
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...
1 min read
CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...
2 min read
If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...
2 min read
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...
2 min read
Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...