Catching the Hot Potato – Building Effective Application Governance Models
May 1, 2025 •John O’Neill Sr
Hot Potato – Who Should Own Application Governance in Entra ID? (Part 4 of 4)
In the first three parts of this series, we explored the application...
Read MoreRisk Reality – Consequences of Unclear Application Governance in Entra ID
April 16, 2025 •John O’Neill Sr
Welcome to Part 3 of our blog series, Hot Potato – Who Should Own Application Governance in Entra ID. In Part 1 and Part 2 of this series, we...
Read MoreIdentity Security Predictions for 2025 - Q1 Update
April 3, 2025 •Alistair Pugin
We kicked off Season 3 of the AppGov Preventive Maintenance series by focusing on 4 things:
Read MoreHot Potato – Who Should Own Application Governance in Entra ID? (Part 1)
March 6, 2025 •John O’Neill Sr
Applications are the lifeblood of productivity in today's Cloud-first world. From collaboration tools to CRM systems, specialized software powers...
Read MoreUpdate Your OneNote API Permissions Before March 31, 2025, to Prevent Outages
February 27, 2025 •Sander Berkouwer
Microsoft plans to disable OneNote’s app-only permissions to improve security to its advanced note-taking app. When your Entra apps rely on this...
Read MoreEnhancing Security with Conditional Access for Workload Identities
February 19, 2025 •Louis Mastelinck
Microsoft enables us to secure our service principals using their Workload Identities Premium license. In this blog, we’ll explore the potential...
Read MoreThe End of RBAC Application Impersonation - Your 10-Step Survival Guide
February 7, 2025 •John O’Neill Sr
Third-party applications and services have commonly used Exchange Web Services (EWS) for integration with Microsoft Exchange environments. Ensuring...
Read MoreHow to Risk Profile Your Entra ID Enterprise Apps
January 9, 2025 •Alistair Pugin
Now that Ignite is over and everyone has managed to recover from all the announcements and end-of-year craziness, it’s time to have a look at what...
Read More