The Cracks in Microsoft’s Entra ID

Microsoft's Entra ID, previously known as Azure Active Directory Password Protection might not be enough to protect your passwords. The post The Cracks in Microsoft’s Entra ID appeared first on Enzoic ...
AD Active Directory microservices

Securing Active Directory and Azure AD

As enterprises have shifted to the cloud, Azure AD has been the natural way to extend the Active Directory paradigm ...
Security Boulevard

Protect Active Directory Better

Keeping Active Directory out of Hackers’ Cross-Hairs Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how ...
Satya Nadella, with caption quote: “Culture of toxic obfuscation”

Microsoft is a “Strategic Problem in the Security Space,” Says CEO

Fist of FAIL: Tenable CEO Amit Yoran has had enough—and he’s not gonna take it anymore. Satya Nadella (pictured) can’t be happy ...
Security Boulevard
A PRC flag flies atop a metal flagpole

China Breaches Microsoft Cloud — Spied on US Govt. Email

Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Security Boulevard
I’d TAP That Pass

I’d TAP That Pass

Summary:Given that:Temporary Access Passes (TAP) are enabled in the Azure AD tenantANDYou have an authentication admin role in Azure ADYou can assign users a short lived password called a Temporary Access Pass (TAP) ...

How Azure AD Password Protection Identifies a “Bad” Password

Relying on Microsoft’s Azure AD Password Protection feature to keep weak and compromised passwords out can leave your users and data at risk. The post How Azure AD Password Protection Identifies a ...

Extending Identity Security Visibility for Azure AD Identity Protection

Your ability to properly assess your risk is directly correlated to the breadth and depth of your intelligence.  For security teams seeking to protect against identity-based threats, they need to be able ...
data privacy TriggerMesh IBM cloud threat suspicious activitylogging

Top Threat Detections Can Identify Suspicious Activity

Here’s an understatement: the cloud has changed everything. Another one: Microsoft is a target of threat actors. So, it seems to track that 71% of users have suffered an account takeover of ...
Security Boulevard