AUTHOR PROFILE

Ed Higgins

Explore blogs and other resources created by one of Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Stryker Intune Attack Blog Image - Error alert

When Device Management Becomes the Weapon: Lessons from the Stryker Intune Attack

By Ed Higgins | March 17, 2026

The Stryker Intune attack highlights the risk of operational disruption over data theft in modern enterprise security. Implement these controls to improve your security posture.

Read More
Graphic of a lock icon surrounded by elements of cybersecurity such as user icon, access icons, governance icons, etc. Feature Image: What is MDR and do you need it?

What is MDR and do you need it?

By Ed Higgins | February 26, 2026

MDR (managed detection and response) is a security service that provides 24/7 threat monitoring, investigation, and response through a dedicated team of security experts. You likely need it if your organization lacks the staff or expertise to run a security operations center, faces compliance requirements, or wants faster threat detection and response than your current setup allows.

Read More
Blog Feature Image Groundhog Day Security Blog 2026 - Feeling Stuck in A Cybersecurity Loop

Why Security Leaders Feel Stuck in a Loop (and How to Break It)

By Ed Higgins | January 29, 2026

Learn the importance of modern security models in addressing familiar exposures and enhancing operational effectiveness in security.

Read More

The New Era of Autonomous Security: 16 Microsoft Ignite 2025 Announcements Every Organization Must Act On

By Ed Higgins | December 10, 2025

At Ignite 2025, Microsoft made announcements on significant advancements in the world of autonomous security, simplifying complex systems & speeding up incident investigations.

Read More
AI security illustration - robot represents AI among computer parts

The AI Security Reality Check: Are You Ready to Scale AI Safely?

By Ed Higgins | November 11, 2025

Understand the key concerns around AI security, including data leaks and regulatory challenges faced by organizations adopting AI.

Read More
Alert Fatigue Blog Image - Stressed man works at his computer with alert symbols all around him

Alert Fatigue in Microsoft Security: Why CISOs Can’t Ignore It

By Ed Higgins | November 11, 2025

Alert fatigue is draining SOC teams and increasing risk. Learn why CISOs must address rising alert volume in Microsoft environments to protect security and reduce burnout.

Read More
professional male sat at work desk, code shown on computer screen

Risks, Gaps, and Governance in User Lifecycle – CISO Perspective

By Ed Higgins | September 15, 2025

Identity is no longer just human. From employees and contractors to IoT devices and AI agents, every identity brings risk if unmanaged. This blog examines the CISO’s view of user lifecycle governance, the biggest gaps organizations face, and how identity-aware policies can strengthen resilience.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More