SOLUTION ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Derek Tannahill, Quisitive's VP of Security, professional headshot

Strengthening the Future of Security: A Conversation with Derek Tannahill, Quisitive’s New VP of Security

By Quisitive | September 17, 2025

Quisitive welcomes Derek Tannahill as VP of Security. In this interview, he shares his vision for security, identity, AI, and how Quisitive is helping customers align with Microsoft’s security strategy.

Read More
professional male sat at work desk, code shown on computer screen

Risks, Gaps, and Governance in User Lifecycle – CISO Perspective

By Ed Higgins | September 15, 2025

Identity is no longer just human. From employees and contractors to IoT devices and AI agents, every identity brings risk if unmanaged. This blog examines the CISO’s view of user lifecycle governance, the biggest gaps organizations face, and how identity-aware policies can strengthen resilience.

Read More
3 professional colleagues gathered around computer. Male and female looking at eachother in conversation, 3rd male looking at screen.

Enhancing Microsoft Identity Solutions with Quisitive’s User Lifecycle

By Cameron Fuller | September 10, 2025

Quisitive’s User Lifecycle builds on Microsoft Entra to solve real identity challenges – automating onboarding, access, compliance, and reporting to keep organizations secure and agile.

Read More
Two colleagues sitting at a table in a café, looking at a laptop together. One person is pointing at the screen while the other listens, both wearing glasses.

Modernizing User Management: Microsoft’s Lifecycle Transformation with Entra and API Workflow

By Michael Leach | August 26, 2025

From onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
Hands typing on a keyboard with the lock and log-in form in the middle.

10 Cloud Network Security Best Practices to Protect Your Business

By Christophe Foulon | August 18, 2025

Lock down your cloud and protect your business with these real-word best practices, backed by industry standards.

Read More
Preparing Your Business for CMMC 2.0 Compliance

Preparing Your Business for CMMC 2.0 Compliance While Safeguarding Your Sensitive Assets

By Christophe Foulon | August 15, 2025

Learn the key steps to achieve CMMC 2.0 compliance and protect your business while staying ready for DoD contract requirements.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More