Microsoft 365: CSP Changes October 2025
The summer break is over and Microsoft is starting the fall with full force. There will be a fundamental reform of the Cloud Solution Provider (CSP) program that will turn everyth…
M365 Allgemein
The summer break is over and Microsoft is starting the fall with full force. There will be a fundamental reform of the Cloud Solution Provider (CSP) program that will turn everyth…
M365 Allgemein
Microsoft Entra ID is the central platform that organizations use to manage their identities and access rights. As soon as you log in to the Entra Admin Center , you will encounte…
M365 Allgemein
One of the biggest gateways for data loss is not always the hacker who cracks a password, but the gullible employee who gives an app access to his data. "This app wants to read yo…
Microsoft
In modern identity management, multi-factor authentication (MFA) is the gold standard. But attackers don't sleep: Techniques such as MFA fatigue aim to bombard users with push not…
Microsoft
In modern IT security, identity is the new firewall. For administrators, this means that protecting user accounts in Microsoft Entra ID (formerly Azure AD) is a top priority. But …
M365 Allgemein
If Conditional Access is the bouncer, then the authentication methods are the badges and keys that your users show. The days when a simple password was enough are over. But not ev…
M365 Allgemein
Devices are now the new security perimeter. Whether it's a company laptop or a private smartphone (BYOD), as soon as a device accesses your data, it needs to be managed. Effective…
M365 Allgemein
Effective controls are essential when managing groups in Microsoft Entra.A "group" is rarely just a list of names, but often includes teams, SharePoint pages, and entire file repo…
M365 Allgemein
Managing user permissions is often a balancing act: If you share too much, security gaps arise. If you restrict too much, productivity suffers and your mailbox is overflowing with…
M365 Allgemein
Conditional Access in Microsoft Entra IDConditional Access provides precise control over access conditions to resources, ensuring compliance with data privacy regulations and prot…