
Azure
Microsoft Defender EASM
Microsoft Defender EASM – for vulnerability monitoring. Today, IT departments manage a vast array of

Microsoft Defender EASM – for vulnerability monitoring. Today, IT departments manage a vast array of

NIS2 – An easy, two-day effort, I’ve heard it said. However, this may not be

Have you ever wondered how to engage users in cybersecurity efforts? Cybersecurity is a vital

On the morning of May 16, 2024, we organized a webinar on Cisco Meraki cloud-managed

Organizations today face increasing demands in the areas of information security and data protection. The

Zero Trust architecture, SASE, and SSE technologies have been hot topics for a few years

In the first part of communication security, I discussed message hygiene, specifically how we can

In this two-part blog post, we will cover: what every organization should consider today to