Corona put many companies in a situation where they needed to enable work from home. As a result, the need […]
Microsoft BlueHat Security Conference 2022 in Israel
In February 2022, Alex called – Hey, do you want to fly with us to Isreal? The reason was, on […]
How attackers can bypass conditional access
Access protection via multifactor authentication is important and right. However, there are ways to circumvent protection measures such as conditional […]
What Azure AD role does the security team really need?
There are several hurdles to overcome when implementing a least privilege approach. One of these hurdles is selecting the right […]