Now that you have a plan, it’s time to start deploying

Now that you have a plan, it’s time to start deploying

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance ...
Escaping the Whale: Things you probably shouldn’t do with Docker (Part 1)

Escaping the Whale: Things you probably shouldn’t do with Docker (Part 1)

In this blog post, I won’t spend too much time explaining what Docker is and is not. You can do some research on your own if you want to learn more about ...
Securing the modern workplace with Microsoft 365 threat protection – part 4

Securing the modern workplace with Microsoft 365 threat protection – part 4

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Responding to ransomware in the Modern Workplace Over the last few weeks, we have shared the roots of ...

NIST updates cybersecurity framework

It’s been a long time coming. The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) recently released version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity, or affectionatey called ...

Information Security: A Strategy for Small Business

/ / Uncategorized
The Internet’s importance to businesses of all sizes and across all industries is indisputable. Beyond optimizing efficiency internally, the Internet also provides innumerable opportunities for business development in new and larger markets ...

The final compliance countdown: Are you ready for GDPR?

On May 25, the General Data Protection Regulation (GDPR) will replace the Data Protection Directive as the new standard on data privacy for all organizations that do business with European Union (EU) ...
Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

/ / Uncategorized
A new vendor evaluation analyst report from the UK-based Cyber Management Alliance, puts Thycotic’s Privileged Access Management solution—Secret Server—at the top of its Leaderboard, ahead of the traditional 800-pound gorilla in the ...

Here is Homeland Security, black swans, and thwarted cyberattacks

/ / Uncategorized
Last week, I had the honor of addressing The Homeland Security Training Institute (HSTI) at the College of DuPage as part of the HSTI Live educational series. The event featured other prominent ...
Securing the modern workplace with Microsoft 365 threat protection – part 3

Securing the modern workplace with Microsoft 365 threat protection – part 3

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Detecting ransomware in the modern workplace Over the last two weeks, we have shared with you the roots ...

Social Engineering – Why hack it, when people are just giving away their information!

/ / Uncategorized
In today’s technologically driven society, more and more criminals have turned to cyber crime as a means to steal information and intrude on other people’s privacy. These cyber criminals are often thought ...
Loading...