Using Regular Expressions to Build a Microsoft Purview Custom Sensitive Information Type

Using Regular Expressions to Build a Microsoft Purview Custom Sensitive Information Type Introduction A colleague of mine needed to create a Microsoft Purview custom Sensitive Information Type (SIT) for a client– The client wanted to use this SIT as part of their implementation of Microsoft Purview. The client needed the SIT to match on occurrences […]

Configuring Internet Facing Firewall Rules for Microsoft Teams Direct Routing

Configuring Internet Firewall Rules for Microsoft Teams Direct Routing Introduction This is the fourth in a series of articles on hardening AudioCodes Session Border Controllers (SBCs). The series is mostly following the guidance provided by AudioCodes. These configuration notes are referenced at the end of this article. These articles are components of eGroup | Enabling […]

How to Save on Sentinel’s Recurring Costs

How to Save on Sentinel’s Recurring Costs While Microsoft Sentinel is a powerful tool to identify and resolve sophisticated cyber attacks, organizations who pilot without taking preliminary steps to minimize costs might experience some sticker shock. This blog outlines some of the more obvious and subtle optimizations that are often missed. Don’t Go with Pay-As-You-Go […]

Risk Reductions – The Cloud Benefit We Don’t Talk About

Risk Reductions – The Cloud Benefit We Don’t Talk About Most cloud decisions that I have been a part of in the past, or help clients with today, are typically dominated by budget, security, functionality, and adoption considerations. While these are all extremely important, risk reductions outside the security space often go unrecognized. These other […]

Virtual CISO – An appealing alternative to CISO

Virtual CISO – An Appealing Alternative to CISO The cybersecurity market is in a state of influx as it matures into a more mainstream information technology service. As the number of cyber-attacks from e-mail phishing to sophisticated data farming are exponentially growing, there are not enough cyber security experts to keep up with the demand. […]

Separation of Untrusted Network Traffic on AudioCodes SBCs

Separation of Untrusted Network Traffic on AudioCodes SBCs Introduction This is the third in a series of articles on hardening AudioCodes Session Border Controllers (SBCs). The series is mostly following the guidance provided by AudioCodes. These articles are listed at the end of this article. AudioCodes recommends untrusted network traffic be both physically and logically separated […]

The Journey to Zero Trust

The Journey to Zero Trust The Zero Trust concept has been around for a while now, and the rise of remote work related to COVID lockdowns supercharged the Zero Trust conversation.  Many organizations had to scramble to enable employees to work remotely but did not have technology environments that were prepared for it.  As a […]

Improving Cloud Security Policies

Improving Cloud Security Policies Our Strategic Advisors find a consistent gap when reviewing our customers’ security policies: a lack of focus on cloud computing. Even in organizations with many traditional policy documents, there’s a lag in updating them for cloud technologies like Microsoft 365. Additionally, the gap widens when it comes to documenting the standard […]

The Value of the Roadmap

The Value of the Roadmap Since making the transition to consulting from technology leadership roles, I am constantly surprised at how many organizations have not documented and agreed upon a technology roadmap, yet have spent enormous amounts of money and time purchasing licensing, hardware, and applications. This usually leads to an environment with overlapping products, […]

AudioCodes SBC Configuration Update for Teams Direct Routing

UPDATE! AudioCodes SBC Configuration Update for Teams Direct Routing Introductions On October 26, 2022, AudioCodes published 0483 Product Notice – SBC Security Configuration update for Microsoft Teams Direct Routing. The article provides configuration information to mitigate a recently discovered vulnerability in the Session Border Controller (SBC) configuration for Teams Direct Routing that had been previously […]