CISO Strategy August 7, 2025 Seeing Everything. Acting on Nothing. When visibility looks like control but behaves like chaos. Michael Henry Love0
Sentinel Playbook June 19, 2025 Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden.… Shannon Evans Love0
Sentinel Playbook June 4, 2025 Making Cloud Risk Data Actionable in Sentinel: A Playbook for CSPM Integration The Posture Visibility Problem CrowdStrike Cloud Security Posture Management (CSPM) provides critical visibility into misconfigurations—such… Shannon Evans Love0
SecurityTechnology April 3, 2025 Integrating CrowdStrike Alerts with Microsoft Sentinel: Streamlining Threat Visibility When Security Tools Don’t Talk to Each Other Managing multiple security tools shouldn’t feel like… Shannon Evans Love0
All BlogsSecurity January 15, 2023 Incident Reporting Using PagerDuty Dashboard Accelerynt customers utilizing Microsoft Sentinel can now manage incident reporting via the PagerDuty Dashboard. PagerDuty’s… Michael Henry Love0
All BlogsSecurity January 11, 2023 How to Use Azure Active Directory Locations Imagine you’re responsible for security at a company that uses Azure Active Directory. One day,… Michael Henry Love0