Recent Blogs
Strong authentication controls like MFA significantly reduce account compromise — but they don’t eliminate the risk of password exposure. In many organizations, users still interact with legacy syst...
Apr 20, 2026176Views
0likes
0Comments
Meet Fabrício Assumpção, a Technical Specialist Architect for a Microsoft Security and Compliance Certified Partner, based in Brazil. Fabrício considers his involvement with the Microsoft Securi...
Apr 15, 2026177Views
2likes
0Comments
Enterprise cybersecurity in large organisations has always been an asymmetric game. But with the rise of AI‑enabled cyber attacks, that imbalance has widened dramatically - particularly for UK an...
Apr 15, 2026266Views
2likes
0Comments
How to set up the Workbook
Use the steps outlined in the Identify and Remediate Credentials article to get the right rules in place to start capturing credential data. You may choose to use custom ...
Apr 15, 2026648Views
2likes
0Comments
3 MIN READ
When Conditional Access policies enforce MFA across all cloud apps and include external users, encrypted attachments may require additional considerations. This post explains why.
This behavior app...
Apr 13, 2026431Views
2likes
0Comments
What is changing?
In early 2024, Azure Key Vault introduced a modernized hardware security module (HSM) platform based on FIPS 140-2 Level 3 certified HSMs. As part of this evolution, the legacy HS...
Apr 13, 2026297Views
0likes
0Comments
Get ready for an electrifying event! The Microsoft Security Community proudly presents Purview Lightning Talks; an action-packed series featuring your fellow Microsoft users, partners and passionate ...
Apr 07, 2026835Views
4likes
0Comments
7 MIN READ
Designing Authorization‑Aware AI Agents at Scale
Enforcing Runtime RBAC + ABAC with Approval Injection (JIT)
Microsoft Entra Agent Identity enables organizations to govern and manage AI agent ide...
Apr 07, 2026676Views
1like
0Comments
12 MIN READ
Uros is recognized as a Most Valued Professional (MVP) by Microsoft as an exceptional community leader for their technical expertise, leadership, speaking experience, online influence, and commitment...
Apr 07, 2026259Views
1like
1Comment
Why Agent Security Alone Is Not Enough?
Foundry‑level controls are designed to prevent unsafe behavior and bound autonomy at runtime. But even the strongest preventive controls cannot answer key go...
Apr 02, 2026246Views
0likes
0Comments
Tags
- security413 Topics
- microsoft information protection293 Topics
- microsoft purview292 Topics
- compliance250 Topics
- information protection and governance212 Topics
- microsoft 365169 Topics
- data loss prevention154 Topics
- cloud security142 Topics
- insider risk management121 Topics
- threat protection100 Topics