In celebration of the half way point in our webinar series I’m letting you choose the next topic. I took suggestions during the June webinar and those are what you see here. Let me know which topic to present in July
You may also like
If we’d like to make more money from the cloud than we ever did from infrastructure, then I think we shouldn’t be worried. There’s more money to be made than there ever was in infrastructure
New ways to secure email use old tools like transport rules, some are anti-phishing rules, some are cloud app security policies, some are conditional access.
Setting up a standard set of groups is a critical component of managing security and configuration policy
Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We’ll take that analysis and implement a solution based upon it