Insights
Practical thinking from real Microsoft 365 security and identity work.
Identity: The New Perimeter in Zero Trust
Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t…
Devices – The Second Pillar of Zero Trust
Introduction In the first post of this series, we explored how identity has become the new perimeter in a world where users, apps, and…
Applications – The Third Pillar of Zero Trust
Introduction In the first two posts of this Zero Trust series, we established that identity is the new perimeter and devices are the frontline…
