<img src="https://ws.zoominfo.com/pixel/JV60JGR5LG4sEWlH3Xte" width="1" height="1" style="display: none;">

CIS Microsoft 365 Benchmark v1.1 Released

I am pleased to have participated in and been named a co-editor of the most recent release (version 1.1) of the Center for Internet Security Microsoft 365 Foundations Benchmark. Sharing SecureSky’s...

2020 SS Predictions Blog Image

SecureSky’s Top 5 2020 Cloud Security Predictions

Cloud Computing Adoption Will Accelerate We’re not going out on a limb in predicting cloud services will continue to grow. The information technology world is experiencing a tectonic shift, led by...

Detecting BEC Attacks and Compromise  Super Smaller Image for Blog

Detecting BEC Attacks and Compromise - Part 5

1.0 Introduction Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection! In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks...

Azure Security Best Practices Blog Image

Azure Security Best Practices

Using Application Security Groups Setting up infrastructure in Azure can, at times, seem quite daunting with all of the available options one can configure within each service. In this blog, we will...

SecureSky-laptop-left-1024x710

SecureSky's NEW Dynamic Cloud Security Blog

It is with great pleasure that I introduce you to the new blog from SecureSky. The SecureSky mission is to assist our clients in utilizing cloud-native and third-party technologies to accelerate...

Subscribe to SecureSky Insights