
Intune
Our latest integration to join the Integration Hub is Microsoft Intune. With this simple feature you can now block elevations on devices that are not compliant with your existing Intune policies.
Our latest integration to join the Integration Hub is Microsoft Intune. With this simple feature you can now block elevations on devices that are not compliant with your existing Intune policies.
Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.
Your users can now use Teams for more than just communication; they can approve or deny Requests for administrative access via a dedicated Teams channel.
You can now keep track of Events with our custom-built Power BI template - for customers who use data visualization as part of their business and security strategy.
Add another layer of enterprise security with our latest integration: send Auditlog data from your User Portal to your Microsoft Sentinel setup.
This blog by Simon Hartman Eriksen shares his experience with the LAPS-replacement feature - currently available on Windows andmacOS, and coming soon to Linux.
MS LAPS is a necessity and, like most necessities, only covers the bare minimum. That’s why we decided to take the necessary parts of LAPS and turn them into something much cooler. But hey - we’ll let you be the judge.
The new feature designed to eliminate the need for Microsoft LAPS.
Six options to deal with Microsoft’s PrintNightmare KB5005652.
Microsoft LAPS was released in 2015 with the main purpose of making it more difficult for hackers to spread accross IT networks. This Infosecurity Magazine blog explains how MS LAPS works and how it compares to Admin By Request.
AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.
Discover the key differences between RBAC vs ABAC vs PBAC in access control. Find out which model best fits your organization’s security and compliance needs.
Spot these social engineering indicators before you get tricked. Discover 10 red flags attackers use to manipulate your actions and access sensitive data.