SOLUTION ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Exploring Innovation in Legislative IT: Quisitive at NALIT & LINCS 2025

By Quisitive | October 17, 2025

Highlights of the NALIT & LINCS Professional Development Seminar, insightful discussions and networking with like-minded professionals.

Read More
Employees sat beneath desks, hiding from cyber attackers.

How to Prepare for a Cyber Attack: Identity & Cloud Security with Microsoft 365

By Christophe Foulon | September 29, 2025

Cyber attackers now target identities and cloud apps more than devices. Learn how Microsoft 365, Defender, Entra, and Azure can help you prevent and respond to these modern threats.

Read More

Register Now: 5 Cybersecurity Gaps You Must Close Before 2026

By Quisitive | September 19, 2025
Read More

Register Now: Agentic Security: How AI Agents Are Rewriting the Rules of Identity Governance

By Quisitive | September 17, 2025
Read More
Derek Tannahill, Quisitive's VP of Security, professional headshot

Strengthening the Future of Security: A Conversation with Derek Tannahill, Quisitive’s New VP of Security

By Quisitive | September 17, 2025

Quisitive welcomes Derek Tannahill as VP of Security. In this interview, he shares his vision for security, identity, AI, and how Quisitive is helping customers align with Microsoft’s security strategy.

Read More
professional male sat at work desk, code shown on computer screen

Risks, Gaps, and Governance in User Lifecycle – CISO Perspective

By Ed Higgins | September 15, 2025

Identity is no longer just human. From employees and contractors to IoT devices and AI agents, every identity brings risk if unmanaged. This blog examines the CISO’s view of user lifecycle governance, the biggest gaps organizations face, and how identity-aware policies can strengthen resilience.

Read More
3 professional colleagues gathered around computer. Male and female looking at eachother in conversation, 3rd male looking at screen.

Enhancing Microsoft Identity Solutions with Quisitive’s User Lifecycle

By Cameron Fuller | September 10, 2025

Quisitive’s User Lifecycle builds on Microsoft Entra to solve real identity challenges – automating onboarding, access, compliance, and reporting to keep organizations secure and agile.

Read More
Two colleagues sitting at a table in a café, looking at a laptop together. One person is pointing at the screen while the other listens, both wearing glasses.

Modernizing User Management: Microsoft’s Lifecycle Transformation with Entra and API Workflow

By Michael Leach | August 26, 2025

From onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More