Have you overshared files within Microsoft365??
We have shared files from OneDrive, Teams and SharePoint since we discovered the “Share” button! But have we…
We have shared files from OneDrive, Teams and SharePoint since we discovered the “Share” button! But have we…
Eggs and onions One of the most important principles in security is ‘defense in depth.‘ Personally, I prefer…
What’s a Device Code? When you want to log in and authenticate to Entra ID, you may not…
What is a device filter and why do we care when working with the cloud? While working in…
Happy new year and welcome to 2025! 🥳 In today’s fast-paced digital landscape, staying informed about critical activities…
In part 1 I wrote about the fundamental flaw in Conditional Access and part 2 walked through my…
In part 1 I introduced the fundamental flaw of Conditional Access policies and the broad strokes on how…
As you hopefully already know, Entra ID Conditional Access (CA) is the primary tool for managing Identity security…
Has Datatilsynet become an echo-chamber or are they afraid to take a stance in the world of AI…
Almost straight from NIC Empower, a huge event in Oslo where Crayon plays a huge part, and both…