<img height="1" width="1" src="https://www.facebook.com/tr?id=1529264867168163&amp;ev=PageView &amp;noscript=1">
blog_listing_hero_img.jpg

ENow Software blog

14
Jul

Having an Identity Crisis

In this article, I’m going to tie together how our email address is used to craft common attacks against our identity services, how we are exposed and what we can do about it. My...
Read More
30
Jun

Securing Exchange Servers

Securing Exchange Servers Securing Exchange servers is hard. I mean it can be a giant pain sometimes. There are what, hundreds of millions or maybe billions of lines of code...
Read More
24
Jun

Thanks for all the Phish...

Thanks for all the phish.. There’s a running joke in the industry at the moment that the COVID-19 pandemic has done more to drive digital transformation in organizations than any...
Read More
12
May

Using Azure Active Directory Application Proxy to Publish Internal Apps

One of the great features in Microsoft 365 is Azure Active Directory Application Proxy. AAD App Proxy allows you to publish internal web applications to the Internet and ensure...
Read More
26
Mar

Keeping Your Organization Secure With A Remote Workforce

What a difference a few weeks can make. In less than a month, a huge segment of the world’s working population has had to transition to a work from home model. For some workers...
Read More
05
Mar

Zero Trust Networking & Arguing with Physics

When you’re in your own data center and your security model is based on perimeter security and passwords, you’re not cloud ready. Security models that only leverage firewalls and...
Read More
26
Feb

Conditional Access for Office 365

Azure Active Directory Conditional Access has been around since 2016. Conditional Access governs access to cloud resources by evaluating the conditions associated with the sign-in...
Read More
29
Jan

Zero Trust & Azure AD Conditional Access

Introduction By now, Azure AD Conditional Access should no longer be unfamiliar to anyone in IT. As a refresher, it’s Microsoft’s solution for providing a flexible,...
Read More
16
Jan

Top 10 Best Security Practices for Azure

At Microsoft Ignite 2019 last year Mark Simos, Lead Architect for the Microsoft Cybersecurity Solution Group, ran a groundbreaking session about the top ten best security...
Read More
02
Oct

Modern Authentication in Exchange Online

Deactivation of Basic Authentication in Exchange Online In their blog article, "Improving Security - Together," the Exchange product group announced that the insecure Basic...
Read More

Subscribe

to blog Updates

Subscribe to Email Updates

Posts by topic

Posts by Topic

see all

Enjoying the blog? Subscribe!

Subscribe to Email Updates