The Enabling Technologies Blog

Our team of Cloud Strategy Advisors, Solution Architects, Engineers and former C-Suite Executives work diligently to provide our vistors with the most pressing information.

Threat Tracker: Stealthy O365 pop up bypasses MFA

/ Author: Chris Stegh

Takeaways from Senate hearing with SolarWinds, FireEye, and Microsoft

/ Author: Chris Stegh

Microsoft’s New Attack Simulation Training

/ Author: Mark Brezicky

Detecting and Protecting Against Solorigate

/ Author: Chris Stegh

10 Critical Steps to Secure Windows Virtual Desktops

/ Author: Chris Stegh

Azure AD Identity Governance – Terms of Use

/ Author: Mark Brezicky

Azure AD Identity Governance – Privileged Identity Management

/ Author: Mark Brezicky

Azure AD Identity Governance – Entitlement Management

/ Author: Mark Brezicky

Azure AD Identity Governance – Access Reviews

/ Author: Mark Brezicky

Azure AD Identity Governance - Overview

/ Author: Mark Brezicky
ref:_00D80KtFf._5000y1WwWQD:ref