In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.

Oct 19, 2022 | What is Microsoft Defender For...
In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.
Oct 12, 2022 | What is Microsoft Defender For...
In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.
Oct 10, 2022
In our previous blog introducing Continuous Threat Exposure management (CTEM) , we described CTEM as a mindset and process to quickly determine real risk in an organization’s attack surface, and...
Oct 5, 2022 | What is Microsoft Defender For...
In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.
Sep 29, 2022 | What is Microsoft Defender For...
In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.
Sep 23, 2022 | What is Microsoft Defender For...
In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.
Sep 20, 2022 | What is Microsoft Defender For...
In this series of blog posts, SecureSky will over time inventory the various Defender technologies and provide a brief overview and link to additional Microsoft documentation.
Sep 6, 2022 | Industry Insight
Expanding MDR Threat Hunting to Include Exposure Hunting Most Managed Detection and Response (MDR) providers offer some type of threat hunting.
Aug 25, 2022 | Industry Insight
One Month and Counting! Legacy authentication allows applications to connect to servers, services, and APIs (for example, a Microsoft 365 mailbox) using only a username and a password, which leaves...
Mar 30, 2022 | Industry Insight
This blog presents security-related Microsoft Azure assessment findings collected by SecureSky in 2021 against our clients across all verticals ranging from partial cloud migrations to complex...