How to fix the FUNDAMENTAL flaw in Conditional Access (Part 3 – miscellaneous tips)
In part 1 I wrote about the fundamental flaw in Conditional Access and part 2 walked through my…
In part 1 I wrote about the fundamental flaw in Conditional Access and part 2 walked through my…
In part 1 I introduced the fundamental flaw of Conditional Access policies and the broad strokes on how…
Printix is one of the many good solutions to the dreaded problem – how do we solve print…
As you hopefully already know, Entra ID Conditional Access (CA) is the primary tool for managing Identity security…
Have you ever… If any of these sound familiar, you’re not alone. Managing access to tools and data…
December 1st 2023 was the official launch of this blog and now an entire year has passed. Over…
Has Datatilsynet become an echo-chamber or are they afraid to take a stance in the world of AI…
This post is a continuation from part 1 Now that we’ve learned how to connect to Cloud-IQ and…
Almost straight from NIC Empower, a huge event in Oslo where Crayon plays a huge part, and both…
Tired of the hassle of manually buying licenses? Constantly worrying if you’ve bought too many, too few, or…