CATEGORY ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

professional male sat at work desk, code shown on computer screen

Risks, Gaps, and Governance in User Lifecycle – CISO Perspective

By Ed Higgins | September 15, 2025

Identity is no longer just human. From employees and contractors to IoT devices and AI agents, every identity brings risk if unmanaged. This blog examines the CISO’s view of user lifecycle governance, the biggest gaps organizations face, and how identity-aware policies can strengthen resilience.

Read More
3 professional colleagues gathered around computer. Male and female looking at eachother in conversation, 3rd male looking at screen.

Enhancing Microsoft Identity Solutions with Quisitive’s User Lifecycle

By Cameron Fuller | September 10, 2025

Quisitive’s User Lifecycle builds on Microsoft Entra to solve real identity challenges – automating onboarding, access, compliance, and reporting to keep organizations secure and agile.

Read More
Illustration of documents with checkboxes, with a hand marking one of the boxes.

Building Responsible AI in State & Local Government: Why Governance Comes First

By Quisitive | September 8, 2025

AI is moving fast, but governance can’t wait. See what state and local leaders learned in our first 30-Minute Qs with Microsoft.

Read More
Two colleagues sitting at a table in a café, looking at a laptop together. One person is pointing at the screen while the other listens, both wearing glasses.

Modernizing User Management: Microsoft’s Lifecycle Transformation with Entra and API Workflow

By Michael Leach | August 26, 2025

From onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.

Read More

Let’s Connect in Juneau  – Quisitive at the National Conference of State Legislatures 2025 NALIT & LINCS Seminar

By Quisitive | August 26, 2025

Quisitive is heading to Juneau for the NALIT & LINCS Seminar, September 8–11, 2025. Join us to connect with legislative IT and communications leaders and explore technology solutions for modern legislatures.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More

On‑Demand: 30‑Minute Q’s — Critical Questions for State & Local Government.

By Quisitive | August 20, 2025

State and local government leaders are under intense pressure to modernize but the challenges are real. This monthly series brings together Microsoft and Quisitive experts for a rapid, 30-minute live Q&A on one of the biggest questions facing state and local government today – from Copilot readiness to data governance, cloud security, compliance, agentic AI, digital engagement, and beyond.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
A digitally created image shows a group of business professionals, both men and women in formal attire, working with laptops and tablets in a high-tech environment. Surrounding them is an evolving landscape of cybersecurity concepts such as cloud storage, padlocks, shields, artificial intelligence (AI), data analytics, networking, and secure connections.

What is Proactive Risk Management and Why Continuous Security Monitoring Matters

By Christophe Foulon | August 18, 2025

Learn why today’s forward-thinking executives are making proactive risk management and continuous security monitoring their top priorities.

Read More