FEATURED BLOG
Securing the Supply Chain
Integrate security into every phase of the supply chain and software development to protect against evolving cyber threats in an increasingly connected world.
How to Bypass Azure Conditional Access
Attackers are using this trick to bypass conditional access rules in Azure. In this episode of the #7XFiles, Matt Barnett walks you through the tactic and the remediation necessary to close this gap in your environment.