SOLUTION ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

A shield deflects an attack to symbolize using Vulnerability Remediation best practices to improve your Cloud Security posture

Improving Your Cloud Security Posture with Vulnerability Remediation: 10 Best Practices for the Modern Enterprise

By Christophe Foulon | July 2, 2025

Discover key vulnerability remediation best practices to enhance your security posture and minimize potential business risks.

Read More
Feature Image 30-Minute Q's for SLG Leaders

Register Now: 30-Minute Q’s: Critical Conversations for State and Local Government Leaders

By Quisitive | July 2, 2025
Read More
Blog Feature Image: How Microsoft Purview Helps in the Age of AI and Data Chaos - a man asleep at his desk and dreaming of Microsoft Purview

How Microsoft Purview Helps You Sleep Easier in the Age of AI and Data Chaos

By Quisitive | June 27, 2025

Learn why Microsoft Purview is an essential tool for data management and mitigating cybersecurity risks in the age of AI.

Read More
Blog Feature Image - 10 Cloud Network Security Best Practices, Image of a cloud on top of a circuit board

10 Cloud Network Security Best Practices to Protect Your Business

By Christophe Foulon | June 25, 2025

Navigating cloud network security is crucial for success. Learn 10 practical tips and best practices to enhance your security posture in the cloud.

Read More
Case Study Feature Image: Dover Chemical Manufacturing Facility

Rapid Implementation of Dynamics 365 F&O Improves Security at Dover Chemical

By Quisitive | June 9, 2025

See how Dover Chemical transformed its security approach following a ransomware attack, partnering with Quisitive for Dynamics 365 F&O.

Read More
Recap Blog - 4 Key Takeaways HealthSec Summit 2025 - Thumbprint graphic

Strengthening Healthcare Cyber Resilience: Key Takeaways from HealthSec Summit 2025

By Quisitive | June 9, 2025

Learn about the key discussions at the HealthSec Summit, where industry leaders tackled pressing healthcare cybersecurity issues.

Read More
Blog Feature Image - 10 Microsoft 365 Security Best Practices - a lock sitting on a PC keyboard

Maximizing Your Microsoft Security Posture: 10 Microsoft 365 Security Best Practices

By Christophe Foulon | May 22, 2025

Discover 10 essential Microsoft 365 Security Best Practices that safeguard your data and reduce the risk of cyberattacks.

Read More
Blog Feature Image - 6 Key Insights from the Verizon Data Breach Investigations Report 2025

6 Key Insights from the Verizon Data Breach Investigations Report 2025

By Christophe Foulon | May 16, 2025

Explore the key findings of the 2025 Verizon Data Breach Investigations Report and understand emerging cybercrime trends.

Read More
Feature Image Microsoft Purview Governance Strategies Webinar - Sleep Easier with Microsoft Purview, speaker: Ed Higgins

How to Sleep Easier with Microsoft Purview – Strategies for Data Security and Governance

By Quisitive | April 30, 2025

Tune in as experts from Quisitive and Microsoft discuss how Microsoft Purview can help organizations manage and secure their data, ensuring compliance and mitigating risks associated with data breaches and AI usage.

Read More
Blog Feature Image: Secure Remote Work and Hybrid Work with Zero Trust - Part 2 Adopting & Managing a Zero Trust Model for Remote Work

How to Secure Remote and Hybrid Work Environments using the Zero Trust Model Part 2

By Christophe Foulon | April 29, 2025

Transform your cybersecurity approach to enable secure remote work, focusing on user needs and Zero Trust principles. In Part 2 of this series, I’m doing an in-depth review of the final stages of the Zero Trust Adoption Process: Get Ready, Adopt, and Govern & Manage.

Read More