Securing Identity With Conditional Access – Business Security Weekly #137

    Ajit Sancheti is the CEO at Preempt. Ajit will be discussing Securing Identity with Conditional Access. Full Show Notes Visit https://www.securityweekly.com/bsw for all the latest episodes! Hosts
The post Securing Identity With Conditional Access &… Continue reading Securing Identity With Conditional Access – Business Security Weekly #137

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security incidents. With more and more data feeds into your security analytics products, … Continue reading Empowering Employees to Reduce Security Incidents

Everything You Need to Know About Azure Infrastructure – June 2019


Each month Microsoft adds new features and updates existing products for Azure, here’s the updates you need to know about for June.

The post Everything You Need to Know About Azure Infrastructure – June 2019 appeared first on Petri.

Continue reading Everything You Need to Know About Azure Infrastructure – June 2019

Ping + Preempt: Securing All Access In Hybrid Cloud Environments

Enterprises struggle to understand what is truly going on in their organization: what their users are doing and how to stop risky activity. Add in the complexity of a hybrid cloud environment, multiple legacy systems, unmanaged endpoints, and unsa… Continue reading Ping + Preempt: Securing All Access In Hybrid Cloud Environments

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus (North Korea), Fancy Bear (Russia) or menuPass (China) only target public federal organizations in Western nations like the U.S. This is simply not the case. In fact, attacks… Continue reading What State-Sponsored Attacks Can Teach Us About Conditional Access

CEO Interview: Today’s Threat Landscape Demands Conditional Access Everywhere

Today, too many organizations are approaching complex cybersecurity challenges by attempting to hire their way out of the problem while building disjointed and ineffective security implementations. In a recent interview with Security Weekly, Preem… Continue reading CEO Interview: Today’s Threat Landscape Demands Conditional Access Everywhere

Conditional Access Blocks Downloads of Office 365 Attachments and Documents

SPO blocks conditional access
SPO blocks conditional access

Azure Conditional Access policies are pretty powerful, especially when applications accommodate their controls. OWA and SharePoint Online can co-operate with conditional access policies to block the ability of Office 365 users to download email attachments and documents. Although not a perfect solution, it’s a good start.

The post Conditional Access Blocks Downloads of Office 365 Attachments and Documents appeared first on Petri.

Continue reading Conditional Access Blocks Downloads of Office 365 Attachments and Documents

Building Zero Trust networks with Microsoft 365

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud services… Continue reading Building Zero Trust networks with Microsoft 365

Protecting Office 365 Documents with Conditional Access Policies

Azure Conditional Access policies can be used with Azure Information Protection (AIP) to secure protected documents against unauthorized access. If you have already decided to use AIP as part of your Office 365 data protection strategy, adding a conditional access policy is a quick way to frustrate people who try to access documents when they shouldn’t.

The post Protecting Office 365 Documents with Conditional Access Policies appeared first on Petri.

Continue reading Protecting Office 365 Documents with Conditional Access Policies