CATEGORY ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
A digitally created image shows a group of business professionals, both men and women in formal attire, working with laptops and tablets in a high-tech environment. Surrounding them is an evolving landscape of cybersecurity concepts such as cloud storage, padlocks, shields, artificial intelligence (AI), data analytics, networking, and secure connections.

What is Proactive Risk Management and Why Continuous Security Monitoring Matters

By Christophe Foulon | August 18, 2025

Learn why today’s forward-thinking executives are making proactive risk management and continuous security monitoring their top priorities.

Read More
Preparing Your Business for CMMC 2.0 Compliance

Preparing Your Business for CMMC 2.0 Compliance While Safeguarding Your Sensitive Assets

By Christophe Foulon | August 15, 2025

Learn the key steps to achieve CMMC 2.0 compliance and protect your business while staying ready for DoD contract requirements.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More
A shield deflects an attack to symbolize using Vulnerability Remediation best practices to improve your Cloud Security posture

Improving Your Cloud Security Posture with Vulnerability Remediation: 10 Best Practices for the Modern Enterprise

By Christophe Foulon | July 2, 2025

Discover key vulnerability remediation best practices to enhance your security posture and minimize potential business risks.

Read More
Feature Image 30-Minute Q's for SLG Leaders

Register Now: 30-Minute Q’s: Critical Conversations for State and Local Government Leaders

By Quisitive | July 2, 2025
Read More
Blog Feature Image: How Microsoft Purview Helps in the Age of AI and Data Chaos - a man asleep at his desk and dreaming of Microsoft Purview

How Microsoft Purview Helps You Sleep Easier in the Age of AI and Data Chaos

By Quisitive | June 27, 2025

Learn why Microsoft Purview is an essential tool for data management and mitigating cybersecurity risks in the age of AI.

Read More
Preview Image: 2025 Healthsec Keynote - Beyond Compliance, Building Cyber Resilience in Healthcare

HealthSec 2025 Keynote: Building Cyber Resilience and Data Security in Healthcare

By Quisitive | June 26, 2025

Watch this video to gain practical insights on embedding security across clinical systems and learn what it takes to lead in a digital healthcare landscape where security must move faster than compliance.

Read More
Blog Feature Image - 10 Cloud Network Security Best Practices, Image of a cloud on top of a circuit board

10 Cloud Network Security Best Practices to Protect Your Business

By Christophe Foulon | June 25, 2025

Navigating cloud network security is crucial for success. Learn 10 practical tips and best practices to enhance your security posture in the cloud.

Read More