85% of privileged credentials go unused for 90+ days.That’s not access – it’s an attack surface.Least-privilege isn’t just smart, it’s survival. Modern Windows platforms place a strong emphasis on privilege...
Still using a BitLocker PIN? That’s approaching ancient history. Discover how Windows disk encryption, data encryption, and a passwordless strategy are redefining security – making access seamless and data...
If you think cybersecurity is someone else’s job, think again! Privileged Access Workstations (PAWs) are your frontline defense against targeted attacks. This article reveals how PAWs create a secure, isolated...
Over the last couple of months, I’ve been writing articles on LinkedIn on various Deployment and Security related topics. While the reception there has been overwhelmingly positive, LinkedIn is a closed platform...
Data collection rules allow you to filter Intune Management Extension (IME) events captured by Defender, ensuring only pertinent data is sent to Azure Sentinel. This approach helps manage ingestion costs while...
In this post we will look at the Office File Transfer feature and implement a simple solution to prevent “one way” that users can leak corporate data. Table of Contents Mobile Devices – The Trojan...
Enabling Windows Hello for Business… Why? Why Not? If it ain’t broken, don’t fix it?If the glove doesn’t fit, why debate it any further?We couldn’t possibly attract any malicious interest...