CIS Controls™ for SaaS – Part 5: Security Awareness and Skills Training
Thought Leadership Christian Lerrahn Thought Leadership Christian Lerrahn

CIS Controls™ for SaaS – Part 5: Security Awareness and Skills Training

No system is of any use if nobody actually makes use of it. However, the more users your systems have, the more people can inadvertently put your data at risk. This is particularly relevant in the context of SaaS applications which by definition are available globally. So, CIS Control 14 about security awareness training is particularly pertinent.

Read More
Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company

In the realm of IT management, overseeing user accounts and access to company resources is a fundamental task. While it's common practice to have robust processes for provisioning and de-provisioning users within Microsoft's suite of applications, such as Microsoft 365 (M365), the same diligence often does not extend to non-Microsoft applications.

Read More
Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3

As we discussed in the sharing blog, your organization relies on sharing and working with information both internally and externally.Some of that data will be business and customer sensitive. Detexian’s CTO Adrian Kitto has some suggestions about how to get visibility of the DLP alerts beyond the Microsoft Purview defaults of 7 days.

Read More
Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3

“To share or not to share” is not the question this week, because we all know that your organization relies on sharing and working with information both internally and externally. So this week Detexian’s CTO Adrian Kitto is enabling you to identify and track the risks that external shares in Microsoft M365 are introducing into your organization.

Read More