Blog

An Overview of the HIPAA NPRM

Due to rising cyberthreats, several data privacy laws have emerged over the past few years, including the GDPR, HIPAA, and the CCPA. These laws are designed to protect your data and give you the right to know what is being done with it and for what purposes. This article focuses on HIPAA and a new amendment ...

Read More

Microsoft Purview: Your Data Governance Ally

By Isaac Walker In today’s digital, data-filled world, managing and protecting sensitive information is more complex than ever. With the rise of cloud services, remote work, and AI-powered tools, data governance has become a critical pillar of cybersecurity. That’s where Microsoft Purview comes in. What is Microsoft Purview? Microsoft Purview is a comprehensive suite of data governance, security, ...

Read More

Why Azure Data Factory (ADF) Became My Secret Weapon for Security Data Warehousing

Over the past few months, I’ve been building out a Security Data Warehouse—a centralized place where we pull in data from a variety of sources: Microsoft Defender logs, sign-in events, compliance snapshots, and more. For most of these, we’ve built custom API connectors or pull data directly from log streams. But I ran into a recurring ...

Read More

BitLocker Essentials: Protecting Your Data with Advanced Encryption

BitLocker is a Windows security feature designed to protect data by encrypting drives, making it inaccessible to unauthorized users. This document provides an overview of BitLocker, its types, recovery methods, and potential activation reasons. What Is It? There are two main types of BitLocker: Device Encryption, which is enabled by default and covers the entire device, and ...

Read More

Tracking Defender Antivirus Scans with Log Analytics Insights & Actionable Steps

Microsoft Defender for Endpoint provides powerful antivirus scanning capabilities, but how do you ensure that full scans are occurring regularly across all devices? With Log Analytics, you can track antivirus scans, analyze trends, and take action if full scans are not happening often enough. In this post, we’ll walk through how to use Kusto Query Language ...

Read More

SMS Or an Authenticator App – Which One Is More Secure?

In the world that we live in today, simply using a password is not enough.  Although it has been the most widely used mechanism for authentication, it suffers from many flaws that the Cyberattacker can take advantage of quite easily.  Thus, many businesses today are now requiring their employees and contractors to submit through ...

Read More

Understanding Azure Recovery Service Vaults (RSVs) : Ensuring Secure and Reliable Backup Solutions By Tulasi Nakka

In today's digital landscape, safeguarding data is paramount. Azure Recovery Services Vaults (RSVs) play a crucial role in protecting sensitive information and ensuring business continuity. This blog will explore what Recovery Services Vaults are, the different types available, essential settings to configure, and key results to monitor for optimal backup management. What Are Recovery Service Vaults ...

Read More

A Review of The Public Key Infrastructure

As digital assets become even more interconnected with each other, the need to make sure that any information and data that is transmitted to and through them are difficult to intercept by the Cyberattacker. One area that is being used quite heavily in this regard is known as Encryption and is a branch of Cryptography.  This ...

Read More

Enhancing Device Security with Guard+: A Comprehensive Overview of Policy Configurations

By Tulasi Nakka Introduction In today's increasingly complex digital landscape, organizations must adopt security measures to safeguard their systems and data. Device configuration policies play a pivotal role in maintaining secure and compliant environments, particularly by setting baseline configurations for endpoints such as Windows and iOS devices. These policies ensure that security configurations, such as antivirus scanning, ...

Read More

An Introduction To The DMARC

Email Security Protocol When compared to the late 90’s when the first major Phishing attack occurred on AOL, there are many tools and mechanisms that are now available at your disposal to keep suspicious email from reaching into your inbox.  Although M365 and Microsoft Azure offer a plethora of offerings, there is yet another one which ...

Read More