Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Microsoft 365 GCC High Needed for CMMC Certification?

CMMC is a strict certification, but there’s also a lot of variation within its security controls and the demands it makes of agencies looking to achieve that certification. The standards are high, especially at the higher levels of CMMC, but there are also many tools and platforms available to meet those needs appropriately, without reinventing the wheel from base principles. Businesses need the tools necessary to function in a modern digital world.

How Nightfall Brings AI-Native Context-Aware DLP to Microsoft 365

It's 8:47 AM. Your phone buzzes with another "urgent" DLP alert. You've already ignored three this morning. This one screams "SENSITIVE DATA DETECTED" in all caps. But it’s just a lunch menu with a credit card number for catering. You silence the notification and grab your coffee. What you don't know? While you're dismissing false alarms, your VP of Finance just dropped next quarter's earnings in a public Teams channel. Your DLP system? Completely silent.

Why Back Up Microsoft 365?

Any tool that is crucial for your daily operations – from Microsoft Teams or emails to OneDrive files – needs backup and reliable restore strategies. This way, you support the business continuity, compliance efforts, credibility, and overall security stance of your business. Keep in mind – without a well-thought-out backup strategy, you are risking being exposed to: Let’s take a closer look at aspects affecting your Microsoft 365 data.

New Phishing Kit Bypasses MFA to Steal Microsoft 365 Credentials

Attackers are using a newly discovered phishing-as-a-service (PhaaS) platform dubbed “Salty 2FA” to target a wide range of industries across North America and Europe, according to researchers at ANYRUN. The phishing attacks are delivered via email and primarily attempt to steal Microsoft 365 credentials. Like many popular commodity phishing kits, Salty 2FA is designed to bypass a variety of multifactor authentication measures.

How KnowBe4 Defend Seamlessly Integrates with Microsoft Defender for Office 365 Quarantine-And Why SOC Teams Should Care

Modern Security Operations Centers (SOCs) face a persistent challenge: managing threats across multiple security tools while maintaining operational efficiency. While single-vendor approaches offer simplicity, they often leave gaps that sophisticated attackers are quick to exploit. The reality is that today's threat landscape demands a more nuanced approach—one that combines the best capabilities from multiple specialized vendors.

Microsoft 365 Disaster Recovery best practices

We can all agree that Microsoft 365 powers the daily operations of many modern organizations. These often include data critical for business continuity, which simply flows through Teams, OneDrive, and SharePoint; therefore, even a short service outage could negatively impact productivity or regulatory compliance. However, despite its importance, disaster recovery, or DR, for Microsoft Office is often misunderstood or assumed to be fully covered by Microsoft.

Malicious Connectors Potentially Impact Hundreds of Millions of Microsoft 365 Users

Most Microsoft 365 users aren’t aware of this recently growing serious email threat vector. I have been teaching about the risks of Microsoft email rules, forms and connectors on email clients and servers for decades. Both can be created by an attacker learning your email address and logon credentials (e.g., password or MFA codes).

Data Loss Prevention Guide for Microsoft 365 and SharePoint

Organizations today face an unprecedented challenge: their most valuable assets can disappear in a matter of milliseconds through accidental sharing, malicious theft, or simple human error. Data Loss Prevention is a strategic approach to safeguarding information before it crosses organizational boundaries, acting as both a guardian and a gatekeeper for critical business assets.

KnowBe4 Collaborates with Microsoft: Strengthening Email Security Through Strategic Integration

In today's rapidly evolving threat landscape, cybercriminals are becoming increasingly sophisticated in their attack methodologies, particularly when it comes to email-based threats. Organizations worldwide are recognizing that a single-vendor approach to security, while valuable, may not provide the comprehensive protection needed to defend against the full spectrum of modern cyber threats.