Embracing Zero Trust for Application Security in Entra ID: An Incremental Journey
November 7, 2024 •Nicolas Blank
In our previous webinar on this topic, Zero Trust for Application Security in Entra ID, we made the point that in a cloud landscape, with a massive...
Read MoreConnect to the Microsoft Graph API securely using a Function App and Azure Key Vault
October 24, 2024 •Louis Mastelinck
In a previous blog post, we demonstrated how to authenticate to the Microsoft Graph API using two different methods. The focus was on running a local...
Read MoreBlack Hat Sessions Highlight Key Challenges in Microsoft Cloud Security
September 11, 2024 •Sander Berkouwer
If you kept up with Microsoft vulnerabilitiesthis past month, there were quite a few to read up on. In addition to these and general industry news, ...
Read MoreTop 10 Entra ID Application Security Risks to Look For - Join us on 8/21!
August 15, 2024 •Alistair Pugin
Data Breaches and You. Yes, you. This ain't a dress rehearsal.
Data Breach. DATA BREACH. We've seen it everywhere. Literally everywhere. Companies...
Read MoreMicrosoft Entra Roles & Application Access
July 11, 2024 •Matthew Levy
In cybersecurity, the principle of least privilege is a cornerstone, advocating for the minimal access required for users to perform their functions....
Read MoreSaaS Security Exposed: 265 Days of Alarming Entra ID Application Discoveries
July 2, 2024 •Alistair Pugin
Over the last seven years, I've spent considerable time in Microsoft 365 Security and Compliance solutions. What has become abundantly evident is...
Read MoreENow App Governance Accelerator 2.2: Continuous Monitoring, Detection, and Alerting for Entra ID Apps to Improve SSPM
June 26, 2024 •ENow Software
In today's rapidly evolving threat landscape, the need for robust SaaS Security Posture Management (SSPM) has never been more critical. High-profile...
Read MoreThe Microsoft Graph API offers developers and IT professionals a platform, providing access to an extensive array of Microsoft 365 services and data...
Read MoreIn the fast-paced world of software development, Application Lifecycle Management (ALM) emerges as a critical framework that dictates the success or...
Read MoreUnlocking the Secrets of App Security!
May 9, 2024 •Stephen Rose
Last week was incredibly busy but incredible, to say the least. I was fortunate enough to have the opportunity to reconnect with friends, clients,...
Read More