DR Testing Best Practices with Nutanix: Build Confidence

Non-disruptive DR testing in Nutanix lets you validate runbooks, confirm dependencies, and measure true RTOs—creating audit-ready proof your recovery plan works.
eGroup Completes SOC 2 Examination

eGroup has completed its SOC 2 examination, confirming effective controls across security & availability to ensure client trust and data protection.
Microsoft Purview: Avoiding Common Pitfalls in Small and Mid-Sized Organizations

Many SMBs stumble when rolling out Microsoft Purview. Discover the most common pitfalls and practical strategies to overcome them for long-term success.
Hierarchy of Data Protection for Copilot: Go Beyond Cleanup to Ongoing Governance

One-time cleanups fix immediate risks, but only ongoing governance ensures sustainable Copilot protection. Learn how Purview sensitivity labels and DLP policies help scale, automate, and sustain data security while aligning with compliance frameworks.
Microsoft Label Groups: What’s Changing and How to Prepare

Microsoft is replacing the old parent/sublabel model with Label Groups in Purview. Discover what changes, what stays the same, and how to prepare with a readiness checklist, migration guidance, and eGroup’s support for data governance.
Understanding Identity Provider Chaining for Visibility and Reporting

Identity provider chaining enhances security and visibility by centralizing authentication, enabling SSO, and improving access reporting.
Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data
Over the past 5 months, this blog series has covered the fundamentals of Microsoft Purview. As we have shown, Purview provides a powerful layer of data-aware visibility and protection that complements more traditional security controls like identity management, access control lists, group memberships, endpoint security, and management tools. Those traditional tools are certainly critical, and […]
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 2)
This is the second article in this series. In the first part, we discussed the need to properly configure your Intune settings and policies for Teams Android devices. Here we will go over a few more items related to settings in Intune. We will also go over configuring Conditional Access Policies for these devices. Finally, […]
Teams Android OS Devices Peacefully Coexisting (and Actually Working!) with Microsoft Security and Compliance Policies (Part 1)
Learn how to configure Intune and Conditional Access for Teams Android OS devices—phones, panels, and rooms. Avoid sign-in issues and support Zero Trust.
Compliance as Security Technology
Compliance as Security Technology One of my favorite security analogies is that enterprise information security is like an onion. Each layer of the onion represents a different control that secures the data at the center. Common layers are endpoint protection, mobile device management, MFA, firewalls, encryption, security policies, and staff training. All of these (and […]