Practical guides for Microsoft 365 security, Zero Trust, and automation. Hands-on solutions for IT professionals
Latest Posts
Data – The Fourth Pillar of Zero Trust
In this Zero Trust blog series, we’ve already explored how Identity, Devices, and Applications form the foundation of a modern…
Read More
Applications – The Third Pillar of Zero Trust
In the first two posts of this Zero Trust series, we established that identity is the new perimeter and devices…
Read More
Devices – The Second Pillar of Zero Trust
In the first post of this series, we explored how identity has become the new perimeter in a world where…
Read More
Identity: The New Perimeter in Zero Trust
Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know…
Read More
Zero Trust Blog Series: A Microsoft-Centric Approach
Over the past few years, I’ve seen a growing interest in Zero Trust but also a lot of confusion. Many…
Read More