Compliance as Security Technology
Compliance as Security Technology One of my favorite security analogies is that enterprise information security is like an onion. Each layer of the onion represents a different control that secures the data at the center. Common layers are endpoint protection, mobile device management, MFA, firewalls, encryption, security policies, and staff training. All of these (and […]
New Microsoft Defender Security Tools: MDEASM and MDTI
New Microsoft Defender Security Tools: MDEASM and MDTI Cybersecurity is ever-changing. New attacks and techniques are practically created every day. Organizations are getting more complex with multi-cloud environments. Data is exponentially growing and we are losing visibility into our assets due to poor governance. Last week, Microsoft announced two new Defender solutions as a result […]
How to Fearlessly Implement Your Zero Trust Strategy
How to Fearlessly Implement Your Zero Trust Strategy “Zero What?” So what does Zero Trust mean? Zero Trust has been a term that has been around a long time. Remember the X Files? Agent Molder would always tell his colleagues – “Trust no one”. That pretty much sums it up. You don’t trust anyone who […]
Configuring the Firewall Rules on AudioCodes SBC for Microsoft Teams
Configuring the Firewall Rules on AudioCodes SBC for Microsoft Teams Introductions A few years ago, I wrote a blog on configuring the firewall on an AudioCodes Session Border Controller (SBC). That article covered the rules needed by one of our clients for a Session Border Controller with connections to: A pair of Lync 2013 pools. Two […]
New Microsoft Usage Workshops
New Microsoft Usage Workshops Many Microsoft cloud customers have taken advantage of incentive programs like workshops and deployment funds. Microsoft’s thinking is that by reducing the fees normally charged by qualified partners, customers pay less for a smooth onboarding of new tools and processes. To kickoff cybersecurity month, Microsoft is giving qualified customers a chance […]