Threat Intel
COVID-19 STATEMENT
Cyber Security advice & implications
Key Cloud Vulnerabilities to Monitor and Address
Organisations’ reliance on cloud infrastructure for their data storage and productivity solutions continues to increase, and with it, the associated cyber security risks. While the
Five Common Conditional Access Mistakes and How to Avoid Them
Conditional Access offers a powerful way to enhance security by evaluating real-time signals before granting access to sensitive resources. However, it’s not without its complexities.
Why Is Identity the New Cyber Security Perimeter?
Over the past decade, corporate cyber security has undergone a fundamental transformation. As businesses have embraced cloud-based services and remote work, the days of securing
Conditional Access: The Foundation of Zero Trust Security
In today’s cloud-first, remote-enabled world, safeguarding your organisation’s resources from both internal and external threats is critical. As organisations undergo digital transformations, the challenge becomes
Securing Identity and Access with Microsoft Entra ID
In July 2023, Microsoft announced the rebranding of Azure Active Directory (Azure AD) to Microsoft Entra ID. This change reflects the platform’s expanded multi-cloud and
Understanding, Detecting, and Protecting Against AiTM Attacks
An Adversary-in-the-Middle (AitM) attack is a high-risk form of cyber attack where a malicious actor positions themselves between two communicating parties to intercept, manipulate, or