As a frequent sage on the stage at events, I often talk high-level stuff (such as in a keynote). Can you have guns and butter (a well-known economic model)? In the blog below, Fredrick Harris offers you can accelerate your cloud security strategy without compromising protection.
We scan the security and threat environment here at Microsoft 365 Nation so you can stay focused on your day job. Our friends at Fortinet had just issued details on a newly discovered infostealer attack that uses LokiBot.
This is a timely contribution as in late September we’re host an education session on software defined networking with Wide Area Networks (SD-WAN). So my hope and desire is that you’ll read up on the topic before our event so we both leave richer for it.
I’m constantly amazed at how little I know the wiser and more experienced I get. Case in point. A couple weeks ago I attended the SolarWinds Empower 2019 conference in Atlanta. During a partner panel conversation, the term NIST arose (and I didn’t know what it means – hey – I only know what I know). So as you might imagine, I quickly searched on my laptop while the panelist were speaking.
A can’t resist having some Fall fun. Many Microsoft 365 Nation readers are old enough to recall the popular Vermont-based band called Phish (kids won’t get this). In fact, kids only know “phishing” as an technology attack vector. Fair enough. In the blog below, Raymond Chang does an excellent job of identifying three criminal behaviors that can help you secure your technology by seeing threats from a new perspective.