Recent Blogs
3 MIN READ
Email investigations are a key part of detecting and responding to phishing and malware. As security workflows continue to evolve, there is an increasing need to align email content visibility more c...
Apr 29, 2026502Views
0likes
0Comments
Enterprise inboxes are overwhelmed with graymail — legitimate, bulk email like newsletters, vendor promotions, and product updates that isn't malicious but buries the messages that matter. When high ...
Apr 22, 20261.9KViews
4likes
3Comments
Co-Authors: Cristina Da Gama Henriquez and Ajaj Shaikh
AI is rapidly reshaping both sides of the security landscape, and email remains one of the most common and complex entry points for attacks. A...
Apr 13, 20261.6KViews
2likes
1Comment
5 MIN READ
Email is still a major entry point—but it’s no longer the only one that matters. Today’s attackers are increasingly shifting to collaboration channels like Microsoft Teams, where trust is implicit an...
Mar 20, 20262KViews
2likes
0Comments
5 MIN READ
TL;DR: We're releasing a brand-new Power BI template for email security reporting and a major update (v3) to the Microsoft Sentinel workbook. Both solutions share the same rich visuals and insights. ...
Feb 02, 20263.3KViews
1like
0Comments
7 MIN READ
New Layers of Protection for Teams Messages
With more than 300 million monthly active users on Microsoft Teams, ensuring secure collaboration has become increasingly critical. As the threat landsca...
Jan 14, 20261.8KViews
0likes
1Comment
In today’s evolving threat landscape, phishing attacks are becoming increasingly sophisticated, often leveraging meeting invites to bypass traditional defenses. While Security Operations (SOC) teams ...
Nov 24, 20256.6KViews
4likes
4Comments
Phishing attacks remain one of the most persistent and damaging threats to organizations worldwide. Security teams are under constant pressure to investigate a growing number of user reported phishin...
Nov 18, 20252.5KViews
0likes
0Comments

In incident response, most business email compromise doesn’t start with “sophisticated zero-day malware.” It starts with configuration gaps: forwarding mail outside the tenant, users clicking through...
Nov 13, 20258.6KViews
0likes
3Comments
5 MIN READ
Introduction
As a Microsoft MVP (Most Valuable Professional) specializing in SIEM, XDR, and Cloud Security, I have witnessed the rapid evolution of cybersecurity technologies, especially those de...
Nov 06, 20251.5KViews
4likes
0Comments
Tags
- microsoft 365 defender44 Topics
- awareness & training27 Topics
- prevention27 Topics
- investigation25 Topics
- hunting23 Topics
- remediation22 Topics
- phishing22 Topics
- detection22 Topics
- configuration18 Topics
- email protection basics15 Topics