Jeremy Winter, Microsoft – Enterprise Security Weekly #117

Jeremy Winter is Director of Azure Management, responsible for areas such as Azure Governance, Policy, Configuration, PowerShell, Disaster Recovery, Azure Migrate and the Azure Portal Experiences from within Azure Compute. He joins Paul and John to tal… Continue reading Jeremy Winter, Microsoft – Enterprise Security Weekly #117

Managing Teams Through the Teams and Skype for Business Online Admin Center

Microsoft announced at Ignite that you can soon manage Teams through the Teams and Skype for Business Online Admin Center. Office 365 administrators will welcome this because it means that they can manage teams without being a member of those teams. And they can avoid PowerShell, which is a pity.

The post Managing Teams Through the Teams and Skype for Business Online Admin Center appeared first on Petri.

Continue reading Managing Teams Through the Teams and Skype for Business Online Admin Center

The Quest for Optimal Security

There’s no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a product class, specific framework/standard, or to best align….. Continue reading The Quest for Optimal Security

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Categories:

Business
Security world

Tags: breachcloudmanageme… Continue reading Can we trust our online project management tools?

Podcast: CISO Speak – Policy and Procedure

This months podcast features host Larry Bianculli speaking with guest CISO Jeff Jennings from Healthplex, as well as our very own Matthew Pascucci, cybersecurity practice manager, at CCSI, on policy and procedures. Where do you begin to write company p… Continue reading Podcast: CISO Speak – Policy and Procedure

Risk Assessment and Identifying Vulnerabilities in Your PKI Management

Cyber security is a field both deep and broad with a large number of complicated facets. As no one can be an expert in all things, it can sometimes be difficult even for experienced security professionals to know where vulnerabilities are in the system… Continue reading Risk Assessment and Identifying Vulnerabilities in Your PKI Management

Authentication, Authorization, Accounting and Identity Management

The AAA framework is the logic behind Identity Management systems. AAA stands for Authentication, Authorization, and Accounting that this blog will explain. Authentication “Authentication is the act of confirming the truth of an attribute of a si… Continue reading Authentication, Authorization, Accounting and Identity Management