Microsoft identity acronyms—what do they mean and how do they relate to each other?
This is the first in a blog series to help lessen confusion around identity by sharing with you some of the terms used at Microsoft.
This is the first in a blog series to help lessen confusion around identity by sharing with you some of the terms used at Microsoft.
Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization.
Listen to Ann Johnson discuss the scale of cyber threats—past, present, and future—with security strategist, Marc Goodman on her new podcast, Afternoon Cyber Tea.
Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk.
The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. Learn how to successfully roll out and support MFA in your organization.
Turn on MFA and start building a long-term authenticator strategy that relies on “phish proof” authenticators, such as Windows Hello and FIDO.
If you’re a CIO, a CISO, or any other exec at a company who is thinking about digital security, the user name/password paradigm is more than a hassle, it’s a true security challenge, which keeps many of us up at night.
Read why Ovum believes Microsoft 365 and Azure can protect enterprises who use multiple cloud providers.
Learn how Microsoft approaches identity management with tips you can apply to your own organization—no matter your budget.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more.