AppGov Score Blog

Check out our latest updates!

The acceleration of cloud adoption and AI advancement has fundamentally changed how organizations approach identity security. Drawing from ...

Read More

In our previous webinar on this topic, Zero Trust for Application Security in Entra ID, we made the point that in a cloud landscape, with a massive...

Read More

In a previous blog post, we demonstrated how to authenticate to the Microsoft Graph API using two different methods. The focus was on running a local...

Read More

A few weeks ago, Nicolas Blank and I conducted a webinar to talk about Real word Standards for application security in Microsoft Entra ID. It formed...

Read More

If you kept up with Microsoft vulnerabilitiesthis past month, there were quite a few to read up on. In addition to these and general industry news, ...

Read More

Data Breaches and You. Yes, you. This ain't a dress rehearsal.  

Data Breach. DATA BREACH. We've seen it everywhere. Literally everywhere. Companies...

Read More

I still often encounter the use of user accounts to run automation, scripts, and applications to connect with Microsoft services. By user account, I...

Read More

In the fast-paced and ever-evolving world of IT, configuring systems securely and correctly is paramount. As we’ve seen in the Entra ID application...

Read More

In cybersecurity, the principle of least privilege is a cornerstone, advocating for the minimal access required for users to perform their functions....

Read More

Over the last seven years, I've spent considerable time in Microsoft 365 Security and Compliance solutions. What has become abundantly evident is...

Read More
1 2 3