AUTHOR PROFILE

Ed Higgins

Explore blogs and other resources created by one of Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

AI security illustration - robot represents AI among computer parts

The AI Security Reality Check: Are You Ready to Scale AI Safely?

By Ed Higgins | November 11, 2025

Understand the key concerns around AI security, including data leaks and regulatory challenges faced by organizations adopting AI.

Read More
Alert Fatigue Blog Image - Stressed man works at his computer with alert symbols all around him

Alert Fatigue in Microsoft Security: Why CISOs Can’t Ignore It

By Ed Higgins | November 11, 2025

Alert fatigue is draining SOC teams and increasing risk. Learn why CISOs must address rising alert volume in Microsoft environments to protect security and reduce burnout.

Read More
professional male sat at work desk, code shown on computer screen

Risks, Gaps, and Governance in User Lifecycle – CISO Perspective

By Ed Higgins | September 15, 2025

Identity is no longer just human. From employees and contractors to IoT devices and AI agents, every identity brings risk if unmanaged. This blog examines the CISO’s view of user lifecycle governance, the biggest gaps organizations face, and how identity-aware policies can strengthen resilience.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More

Why OAuth Falls Short, Agent Taxonomy and Scenarios that Challenge Security, and Solution Ideas

By Ed Higgins | June 15, 2025

In this posting, let’s explore why OAuth falls short, look at Agent taxonomy, security challenges, and insights that can help.

Read More
What is an AI Platform Blog Feature Image - a processing chip with the letters AI on top

The Rise of Agentic AI

By Ed Higgins | June 13, 2025

Artificial Intelligence has become a household discussion over the last couple of years, especially given the rise of the generative pre-trained transformer (GPT) models, made famous by ChatGPT.

Read More
Blog Feature Image - 2025 HIPAA Updates

Understanding the 2025 HIPAA Updates and How to Prepare 

By Ed Higgins | March 5, 2025

Over the last few years, there’s been a significant increase in cyberattacks on healthcare organizations. The 2025 HIPAA updates are designed to protect both patients and organizations from this concerning trend. Understand what’s changing and how to stay compliant.

Read More
General Quisitive gradient background

How to Recover from the Recent CrowdStrike Outage

By Ed Higgins | July 19, 2024

As your Microsoft services partner, we are here and ready to help you get back online following the recent CrowdStrike outage.

Read More