Detection-as-Code Feed – 2026 March

Detection-as-Code Feed – 2026 March

PowerShell Logging Disabled Via Registry Key Tampering Disabling PowerShell logging is one of the most effective ways to reduce defender visibility during an intrusion. Attackers may inspect registry keys, test execution to see what appears in the event logs, and...

read more
Common Security Gaps We Find in Microsoft 365

Common Security Gaps We Find in Microsoft 365

We have run several assessments in multiple Microsoft 365 tenants and while every organization has unique needs, the gaps are consistent. Here are the most common security vulnerabilities identified in the initial assessment. Entra ID: Over-Privileged Admins: 80% of...

read more
Introducing Sophos Workspace Protection

Introducing Sophos Workspace Protection

  Easy, effective, and affordable protection for remote and hybrid workers without the cost and complexity of traditional cloud-delivered stacks. Sophos Workspace Protection is a newly launched security solution designed to help IT teams secure today’s hybrid and...

read more