Latest Blog Articles
Part 1: What Is Cyber Resiliency and How Do I Get It?
Recently I was on a call with some Security leaders who were interested in how we at Microsoft could help them with cyber resiliency. But when ...
Mar 10, 2025212Views
2likes
0Comments
When managing identities across multiple tenants, organizations often face a crucial decision: should they choose ADSS (Active Directory Synchronization Service) Tenant Sync or Entra Native Cross-Ten...
Mar 06, 2025401Views
0likes
0Comments
In today’s business environment, mergers, divestitures, and acquisitions (M&A) are becoming increasingly common. However, with these business transformations come the challenges of consolidating mult...
Mar 04, 2025329Views
1like
0Comments
Introducing the Secure Future Initiative: Tech Tips show!
This show provides bite-sized technical tips from Microsoft security experts about how you can implement recommendations from one of the si...
Mar 04, 2025142Views
0likes
0Comments
5 MIN READ
Efficient IMS Migration Methods
The Active Directory Migration Service (ADMS), recently renamed Identity Migration Service (IMS), offers the migration of users and workstations across domains and f...
Mar 03, 2025197Views
0likes
0Comments
If you find yourself creating and maintaining on-premises groups just so they will synchronize to your Azure tenant, it’s time to free yourself from this time-consuming and potentially risky outdated...
Mar 03, 2025666Views
4likes
0Comments
Virtualization-Based Security (VBS) enclaves use the hypervisor’s virtual trust levels (VTLs) to isolate regions of memory and code execution within a user-mode process. This provides a powerful solu...
Mar 03, 20251.8KViews
1like
2Comments
As cyber threats grow in sophistication, identity remains the first line of defense. With credentials being a primary target for attackers, organizations must implement advanced identity protection t...
Feb 25, 2025968Views
0likes
0Comments
Every transformation story has its share of challenges, breakthroughs, and lessons learned. This is the success story of a prominent public sector organization...
Feb 19, 2025335Views
4likes
0Comments
3 MIN READ
In today's digital age, protecting sensitive information is more critical than ever. Sensitivity labels from Microsoft Purview Information Protection offer highly effective controls to limit access t...
Feb 18, 20251.7KViews
2likes
2Comments
Resources
Tags
- security302 Topics
- microsoft information protection249 Topics
- microsoft purview201 Topics
- compliance190 Topics
- information protection and governance178 Topics
- microsoft 365128 Topics
- data loss prevention107 Topics
- cloud security103 Topics
- insider risk management83 Topics
- microsoft defender for cloud apps81 Topics