top of page
Secure Hybrid Identity™
Data and Risk Management
Search


Allow Entries in Microsoft 365 Tenant Allow/Block Lists
Did you know that you can’t create allow entries for domains and email addresses directly in the Microsoft 365 Tenant Allow/Block List?...

José Lázaro Pinos
Aug 21, 20242 min read
Â
Â
Â


New Microsoft Defender for Endpoint simplified Onboarding experience for Android devices
Whether your organisation supports BYOD, COPE, or fully-managed devices, robust security solutions are a must. MDE now offers a...

José Lázaro Pinos
Aug 16, 20241 min read
Â
Â
Â


Four Common Microsoft Security Mistakes
Companies that use Microsoft products and services have access to many of the best security features and controls available in today's...

Performanta
Aug 13, 20243 min read
Â
Â
Â


Microsoft 365 Licensing Matrix for #2024
Are you looking for the best license plan for your enterprise in #2024 that connects, protects, and empowers your employees? Whether you...

Performanta
Aug 5, 20241 min read
Â
Â
Â


How do we fix cybersecurity?
"Cybersecurity keeps growing because it keeps selling. This approach is not working." The cybersecurity market is broken—can we fix it?...

Guy Golan
Jul 24, 20245 min read
Â
Â
Â


HOT OFF THE PRESS: Unified Security Operations Platform
The simpler yet one of the most relevant pieces of documentation I have seen about the new Unified Security Operations Platform and...

José Lázaro Pinos
Jul 15, 20242 min read
Â
Â
Â


Are you struggling to keep up with your multi-cloud security coverage?
Let me introduce you to the Coverage Workbook for Defender for Cloud. Managing cloud security across diverse environments can be...

José Lázaro Pinos
Jul 9, 20241 min read
Â
Â
Â


Three reasons why Microsoft Intune enrolment fails (and how to fix them)
Whether corporate-owned or user-provided, endpoint devices can pose serious issues for security administrators. Online criminals...

Performanta
Jun 28, 20243 min read
Â
Â
Â


How to harden your security with Continuous Threat Exposure Management
The old ways of securing systems no longer work. Many modern cybercrime attacks are potent because they circumvent 'traditional' security...

Guy Golan
Jun 20, 20244 min read
Â
Â
Â


Hot off the Press: Migrate from Splunk to Microsoft Sentinel with the New SIEM Migration Experience!
A NEW built-in migration tool, now generally available within Microsoft Sentinel, supports both Splunk Enterprise and Splunk Cloud...

José Lázaro Pinos
Jun 13, 20241 min read
Â
Â
Â


The blurry lines between nation-state attacks and cybercrime
In recent years, attacks targeting public infrastructure in towns and cities have dramatically escalated. Experts are not surprised and...

Performanta
May 15, 20243 min read
Â
Â
Â


April's most interesting security news: How much will that hack cost?
Calling cybercrime a disease is inaccurate. Diseases usually have clear diagnoses and remedies, with a good sense of the cost involved....

Performanta
May 9, 20243 min read
Â
Â
Â


New research suggests Africa is being used as a ‘testing ground’ for nation state cyber warfare
Global cybersecurity firm Performanta has revealed new insight into the role developing countries play in the ransomware ecosystem...

Performanta
Apr 29, 20242 min read
Â
Â
Â


Security Jargon for Business Pros
How do you secure a building? Is locking the doors enough? Are the windows secured? Is there a fence and lights? Do you have guards...

Performanta
Apr 18, 20243 min read
Â
Â
Â


What the Linux XZ Backdoor Hack tells us about cybercrime
In early April, a Microsoft developer named Andres Freund uncovered what could have been the biggest cybercrime hack in history. While...

Performanta
Apr 15, 20243 min read
Â
Â
Â


March's Most Interesting News: Can they hack your hotel door?
Cybercriminals do not deserve praise, but we should not underestimate their creativity. For example, the electronic door keycards that we...

Performanta
Apr 9, 20243 min read
Â
Â
Â


Deepfakes start to show their hand: February's most interesting cybersecurity news
Deepfakes start to show their hand: February's most interesting cybersecurity news In the 18th century, Catherine The Great toured her...

Performanta
Mar 8, 20243 min read
Â
Â
Â


Microsoft Copilot for Security: What do you need to know?
Can we give our security systems plain-language instructions, as if talking to an assistant, and they fetch comprehensive yet digestible...

Performanta
Feb 20, 20243 min read
Â
Â
Â


Watch those security habits: January's most interesting cybersecurity news
Consistency is crucial for good cybersecurity because criminals target the places we neglect. For example, if your social media provider...

Performanta
Feb 12, 20243 min read
Â
Â
Â


Will Generative AI create a Phishing spike?
In 2022, criminals in the US stole over $2.6 billion through impersonation or imposter scams, according to the Federal Trade Commission....

Performanta
Jan 25, 20244 min read
Â
Â
Â
bottom of page