Category: MS 365 Security Administrator

Microsoft Cloud Security Benchmark (MCSB)

 tonyhughes  June 1, 2023

The Microsoft Cloud Security Benchmark (MCSB) is a set of best practices and recommendations provided by Microsoft to help organizations…

Microsoft Cybersecurity Reference Architectures (MCRA)

 tonyhughes  June 1, 2023

Microsoft Cybersecurity Reference Architectures (MCRA) are comprehensive and scalable frameworks designed to guide organizations in building robust and effective cybersecurity…

NIST Cybersecurity Framework (CSF)

 tonyhughes  May 25, 2023

The NIST Cybersecurity Framework (CSF) is a widely recognized framework developed by the National Institute of Standards and Technology (NIST)…

NIST Risk Management Framework (RMF)

 tonyhughes  May 25, 2023

The NIST Risk Management Framework (RMF) is a systematic and structured approach developed by the National Institute of Standards and…

CIS Critical Security Controls (CSC)

 tonyhughes  May 25, 2023

The CIS Critical Security Controls (CSC) is a set of cybersecurity best practices and guidelines designed to provide organizations with…

Next-Generation Firewalls (NGFWs)

 tonyhughes  May 24, 2023

Next-Generation Firewalls (NGFWs) are advanced network security devices that provide enhanced capabilities beyond traditional firewalls. NGFWs incorporate various security features…

Geofencing

 tonyhughes  May 24, 2023

Geofencing is a cybersecurity technique that involves creating virtual boundaries or perimeters around specific geographic areas. This technique allows organizations…

Data Destruction

 tonyhughes  May 24, 2023

Pulverizing Data destruction through pulverizing, also known as physical destruction or mechanical destruction, is a method used to render data…

Perfect Forward Secrecy (PFS)

 tonyhughes  May 24, 2023

Perfect Forward Secrecy (PFS) is a security property in cryptographic systems that ensures the confidentiality of past communications even if…

RISK

 tonyhughes  May 24, 2023

Risk assessment is the process of identifying, analyzing, and evaluating potential risks and vulnerabilities to an organization’s information systems, data,…