In the first two posts of this Zero Trust series, we established that identity is the new perimeter and devices are the frontline of defence. By verifying every user and...
In the first post of this series, we explored how identity has become the new perimeter in a world where users, apps, and data are no longer confined to the...
Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t a single product or a quick...
So this is the 3rd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction Welcome to the 3rd...
I have decided to create this as a multi part post to hopefully make it easier to understand. Introduction So Following on from my last post I thought I'd share...
I'm trying to "lead by example" (I use that term loosely), when it comes to privileged access. A bit of background For a long time my regular Microsoft 365 account...
I've been working with a customer recently assisting with sorting out their privileged access and assisting them with their adoption of PIM (Privileged Identity Manager) Whilst I'd argue that PIM...
We use cookies to enhance your browsing experience, serve personalised content, and analyse our traffic. By clicking "Accept All", you consent to our use of cookies.