A couple of weeks ago, my wife started a new job at an organization with over 70,000 employees. You’d think that with a headcount like that, they’d have a solid grip on IT security. But surprise! The IT person handing...
This article is an update to my original 2023 post on the importance of MFA. A lot has changed since then – Microsoft is now mandating MFA, and passkeys have evolved from the “cool new thing” to...
Just when you thought OAuth was safe, along comes ConsentFix to remind us that attackers are always two steps ahead. If you’ve been following security news lately, you’ve probably heard about this...
Self-Service Account Recovery (SSAR) is finally here for Microsoft Entra ID! Are you planning or running a passwordless tenant and wondering what to do when your users lose access to all their authentication methods...
Conditional Access: because your security shouldn’t be conditional!It’s the bouncer your data deserves – smart, adaptive, and always on duty.Read why it’s your login’s best wingman. Microsoft Conditional...
Dive into Microsoft Graph authentication with PowerShell. In this blog we explore OAuth flows, PKCE security, and token handling. Learn how to build a secure auth flow from scratch and why the SDK might still be the...
By now, you’ve probably heard the standard Copilot-Ready preparation advice: lock down data, control access, and prevent oversharing. That’s all critical—but it’s only half the equation. Even with perfect data...
In this post, we'll analyse the Entra PowerShell module's authentication implementation and discuss whether it's necessary for your Intune automation needs if you're already using the Microsoft.Graph.Authentication...
Learn how to securely authenticate to Microsoft Graph SDK in your automation workflows using Azure Key Vault, client secrets, and certificates. Discover best practices for securing private keys, when to use certificates...
Recently there have been concerns raised around Autopilot methods being used to side step security measures, and even leave organisations vulnerable to rogue onboarding of devices with no security sanity check measures...