What Is Zero Trust? A Complete Guide for Security Professionals

Trust, for anyone or anything inside a secured network, should be hard to come by. The global shift to cloud environments has changed online security protocols. Therefore, strict verification (of everyone and everything) is now essential. The zero trust model isn’t overkill — it’s now a crucial tenet of network protection. The pandemic helped push […]

The post What Is Zero Trust? A Complete Guide for Security Professionals appeared first on Security Intelligence.

Continue reading What Is Zero Trust? A Complete Guide for Security Professionals

How to Customize Endpoint Security Settings in Microsoft Intune

In this article, I’m going to show you how to customize endpoint security settings in Microsoft Intune. Including how to change security baseline settings, how to make sure devices are running a specific operating system version (or later), and how to configure Windows and iOS disk encryption settings. Microsoft provides a series of recommended security […] Continue reading How to Customize Endpoint Security Settings in Microsoft Intune

How to Create a Compliance Policy in Microsoft Intune

In this article, I’m going to show you how to create a compliance policy in Intune, Microsoft’s Mobile Device Management (MDM) solution, that restricts access to resources to cloud managed and compliant devices only. Even if your devices are registered or joined to Azure Active Directory (AD), there are still risks that could lead to […] Continue reading How to Create a Compliance Policy in Microsoft Intune

How to Enable Windows Hello for Business

In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login. […] Continue reading How to Enable Windows Hello for Business

How to Join Windows 10 to Azure Active Directory

Registering Windows 10 devices with an identity provider, like Azure Active Directory, is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10 device with Azure Active Directory […] Continue reading How to Join Windows 10 to Azure Active Directory

MJFChat: Windows 365 vs. Azure Virtual Desktop: How to Choose

  We’re doing a twice-monthly interview show on Petri.com that is dedicated to covering topics of interest to our tech-professional audience. We have branded this show “MJFChat.” In my role as Petri’s Community Magnate, I will be interviewing a variety of IT-savvy technology folks. Some of these will be Petri contributors; some will be tech-company […] Continue reading MJFChat: Windows 365 vs. Azure Virtual Desktop: How to Choose

XDR: The Central Nervous System of Zero Trust

If zero trust is the brain that watches out for the health of the digital body, extended detection and response (XDR) serves as the nerves that bring it information. And as the digital world rapidly changes, XDR can adapt. Why is pairing XDR with zero trust the right choice? Zero Trust in a Changing World […]

The post XDR: The Central Nervous System of Zero Trust appeared first on Security Intelligence.

Continue reading XDR: The Central Nervous System of Zero Trust

Endpoint Protection Done Right: 3 Case Studies

Endpoints are often the weakest link in the security chain, and legacy antivirus solutions are no longer enough to defend against modern threats, including zero day, evasive and fileless malware. Organizations of all sizes are adopting endpoint protect… Continue reading Endpoint Protection Done Right: 3 Case Studies

Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense

Jack Danahy joined me for this episode of the TechSpective Podcast. I had the opportunity to work with and for Jack during our time together at Alert Logic, which acquired Barkly, a company he had co-founded. Prior to Barkly, Jack had been involved in … Continue reading Jack Danahy Discusses Why “Cybersecurity-as-a-Service” Makes the Most Sense

Malware de android: Como as empresas lidam com essa ameaça crescente?

Vamos primeiro concordar com algumas coisas antes de começar: Um, o Android é a plataforma mais acessível para empresas com uma força de trabalho móvel e tem a menor curva de aprendizado de qualquer sistema operacional móvel. Dois, devido à …
The post… Continue reading Malware de android: Como as empresas lidam com essa ameaça crescente?