The problem lies in the passwords
We often hear about phishing campaigns or leaked credentials that cyber criminals tent to abuse, even though organizations invest a lot into cyber security. Passwords are the problem Reason why?…
We often hear about phishing campaigns or leaked credentials that cyber criminals tent to abuse, even though organizations invest a lot into cyber security. Passwords are the problem Reason why?…
Microsoft has recently added additional permissions to be secured in protected actions. Protected actions is a feature that is intended to be assigned to a strong conditional access policy. Protected…
In my latest post, I talked about configuring PIM for groups with Entra ID roles. But access to groups, applications and roles change over time. So, in this post, we…
Welcome to my very first post. It is always difficult to decide how you want to start out, so I thought it would make sense to start with a topic…