<img height="1" width="1" src="https://www.facebook.com/tr?id=1529264867168163&amp;ev=PageView &amp;noscript=1">
blog_listing_hero_img.jpg

ENow Software blog

12
Nov

Moving Application Authentication to Azure Active Directory

Microsoft 365 offers a wide variety of services beyond the full stack of services like Exchange Online, Microsoft Teams, etc. In particular, you can use Azure Active Directory as...
Read More
04
Nov

Microsoft 365 Security Assessment Part 2

Last week I shared part one of my Microsoft 365 Security Assessment where we took a deep dive into securing things related to Azure Active Directory. If you haven’t had a chance...
Read More
28
Oct

Microsoft 365 Security Assessment Part 1

 As a Microsoft 365 certified Security Administrator, and Microsoft certified Azure Security Engineer I have recently done a number of Microsoft 365 security assessments. Some of...
Read More
14
Jul

Having an Identity Crisis

In this article, I’m going to tie together how our email address is used to craft common attacks against our identity services, how we are exposed and what we can do about it. My...
Read More
30
Jun

Securing Exchange Servers

Securing Exchange Servers Securing Exchange servers is hard. I mean it can be a giant pain sometimes. There are what, hundreds of millions or maybe billions of lines of code...
Read More
24
Jun

Thanks for all the Phish...

Thanks for all the phish.. There’s a running joke in the industry at the moment that the COVID-19 pandemic has done more to drive digital transformation in organizations than any...
Read More
12
May

Using Azure Active Directory Application Proxy to Publish Internal Apps

One of the great features in Microsoft 365 is Azure Active Directory Application Proxy. AAD App Proxy allows you to publish internal web applications to the Internet and ensure...
Read More
26
Mar

Keeping Your Organization Secure With A Remote Workforce

What a difference a few weeks can make. In less than a month, a huge segment of the world’s working population has had to transition to a work from home model. For some workers...
Read More
05
Mar

Zero Trust Networking & Arguing with Physics

When you’re in your own data center and your security model is based on perimeter security and passwords, you’re not cloud ready. Security models that only leverage firewalls and...
Read More
26
Feb

Conditional Access for Office 365

Azure Active Directory Conditional Access has been around since 2016. Conditional Access governs access to cloud resources by evaluating the conditions associated with the sign-in...
Read More

Top posts

Subscribe

to blog Updates

Subscribe to Email Updates

Posts by topic

Posts by Topic

see all

Enjoying the blog? Subscribe!

Subscribe to Email Updates