FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
How to Bypass Azure Conditional Access
Attackers are using this trick to bypass conditional access rules in Azure. In this episode of the #7XFiles, Matt Barnett walks you through the tactic and the remediation necessary to close this gap in your environment.