<img src="https://ws.zoominfo.com/pixel/JV60JGR5LG4sEWlH3Xte" width="1" height="1" style="display: none;">
Top 10 Ways To Reduce WFH Bandwidth Consumption

Top 10 Ways To Reduce WFH Bandwidth Consumption

In the new work-from-home (and school-from-home) era, between adding your family “full-time” to your home wifi and the cloud providers and ISPs scrambling to increase capacity, many of you have...

Coronavirus and Security Operations

Will Coronavirus Affect Security Operations?

You cannot open a news site or turn on the television today without rightfully hearing about the coronavirus. While governments and medical systems scramble to respond and contain the virus, it is...

CIS Microsoft 365 Benchmark v1.1 Released

I am pleased to have participated in and been named a co-editor of the most recent release (version 1.1) of the Center for Internet Security Microsoft 365 Foundations Benchmark. Sharing SecureSky’s...

2020 SS Predictions Blog Image

SecureSky’s Top 5 2020 Cloud Security Predictions

Cloud Computing Adoption Will Accelerate We’re not going out on a limb in predicting cloud services will continue to grow. The information technology world is experiencing a tectonic shift, led by...

Detecting BEC Attacks and Compromise  Super Smaller Image for Blog

Detecting BEC Attacks and Compromise - Part 5

1.0 Introduction Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection! In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks...

Azure Security Best Practices Blog Image

Azure Security Best Practices

Using Application Security Groups Setting up infrastructure in Azure can, at times, seem quite daunting with all of the available options one can configure within each service. In this blog, we will...

Subscribe to SecureSky Insights