Author name: Molly Bacurin

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Data Protection and Threat Intelligence

This continues our series about implementing Zero Trust with Microsoft Services. If you missed our post about device trust and security, you can check it out here. This guide will show you how to use sensitivity labels and threat intelligence to protect your Microsoft environment from cyber-attacks. Labels: Sensitivity labels are an essential aspect of [...]

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Data Protection and Threat Intelligence Read More »

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Device Trust and Security

This continues our series about implementing Zero Trust with Microsoft Services. If you missed our previous post about identity and access management, check it out here.  In this guide, we will share tips to help you ensure the safety of your company’s devices. 1. One way to mitigate risk is by implementing Microsoft’s Global Administrator

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Device Trust and Security Read More »

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Identity and Access Management

Embracing a Zero Trust security model within your organization can help your company decrease the chances of a potential breach. In this guide, we will share several steps your company can take to implement a Zero Trust approach to security. 1. The first step to setting up a Zero Trust model is to ensure you

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Identity and Access Management Read More »

Scroll to Top