GROUP ARCHIVE

Blog

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
A man sits in the office and chats with his Dynamics consultants about Dynamics 365 Pricing

Dynamics 365 2025 Release Wave 2: Key Updates and What They Mean for Your Business

By Quisitive | August 19, 2025

Discover what’s new in Dynamics 365 2025 Release Wave 2. From AI to automation, Quisitive helps you unlock features and maximize value.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
A digitally created image shows a group of business professionals, both men and women in formal attire, working with laptops and tablets in a high-tech environment. Surrounding them is an evolving landscape of cybersecurity concepts such as cloud storage, padlocks, shields, artificial intelligence (AI), data analytics, networking, and secure connections.

What is Proactive Risk Management and Why Continuous Security Monitoring Matters

By Christophe Foulon | August 18, 2025

Learn why today’s forward-thinking executives are making proactive risk management and continuous security monitoring their top priorities.

Read More
Preparing Your Business for CMMC 2.0 Compliance

Preparing Your Business for CMMC 2.0 Compliance While Safeguarding Your Sensitive Assets

By Christophe Foulon | August 15, 2025

Learn the key steps to achieve CMMC 2.0 compliance and protect your business while staying ready for DoD contract requirements.

Read More
AI and the Future of Planning

A Retail Industry Perspective on AI and the Future of Planning

By Quisitive | August 14, 2025

Explore how AI is reshaping retail planning, moving from rigid cycles to agile, integrated decision-making across the enterprise.

Read More
Young woman working remotely from her kitchen at home, seated at a laptop.

Microsoft Solution Partner Designations and Specializations: What They Mean and Why They Matter

By Quisitive | August 6, 2025

This blog explains Microsoft’s latest proof of technical prowess so readers can understand what Advanced Specializations are.

Read More

Microsoft Is Retiring SharePoint 2013 Workflows – Here’s What That Means for Nintex Users

By Quisitive | August 1, 2025

Don’t wait until the deadline hits. SharePoint 2013 workflows are being retired, and if your business still depends on them, you need a transition plan. This guide outlines the key dates, risks, and your options.

Read More
Featured Image - EverWatch

​​​Inside the Cockpit: How Quisitive Operates the EverWatch Tie Fighter​

By Cameron Fuller | July 28, 2025

See how Quisitive’s EverWatch monitors Azure in real-time and how our team manages alerts, triage, automation, and diagnostics.

Read More