Zero Trust and Putting Identity First

Creating an Identity Zero Trust Strategy Establishing an Identity Zero Trust strategy ensures that security measures align with business priorities. Create an Identity Zero Trust strategy from the outset to ensure your organization’s security measures align with business priorities. Outlining goals and expected results can help gain buy-in from key stakeholders along the way. Integrate […]
A Cybersecurity Close Call: How We Detected and Contained the Threat

This blog post outlines what could have been a devastating ransomware attack, but became a success story thanks to the power of preparation, coordination, and expertise from our team, who work remotely across multiple shifts to provide round-the-clock protection for clients as a Managed Security Services Provider (MSSP).
Implementing CISA’s SCuBA Project In Your Cloud

This blog post outlines two Microsoft configuration baseline documents that CISA published and introduces an automated assessment tool called ScubaGear to analyze GWS tenant configurations against these baselines.