Chaz VossburgAug 6, 20232 minConditional Access: Modernizing Multi-Factor AuthenticationIn today’s increasingly decentralized IT environment, the modern security perimeter now extends beyond an organization’s network to...
Chaz VossburgAug 6, 20235 minSecuring Office 365 in 8 Simple StepsAs adoption has increased, Office 365 has become an attractive surface for cybercriminals targeting hosted email, user credentials, and...
Chaz VossburgAug 6, 20233 minUsing Cloud App Security to Detect and ProtectMoving resources to the cloud increases flexibility for employees and IT alike. Users can increase mobility and productivity in an...