SOLUTION ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Preview Image: 2025 Healthsec Keynote - Beyond Compliance, Building Cyber Resilience in Healthcare

HealthSec 2025 Keynote: Building Cyber Resilience and Data Security in Healthcare

By Quisitive | June 26, 2025

Watch this video to gain practical insights on embedding security across clinical systems and learn what it takes to lead in a digital healthcare landscape where security must move faster than compliance.

Read More
Blog Feature Image - 10 Cloud Network Security Best Practices, Image of a cloud on top of a circuit board

10 Cloud Network Security Best Practices to Protect Your Business

By Christophe Foulon | June 25, 2025

Navigating cloud network security is crucial for success. Learn 10 practical tips and best practices to enhance your security posture in the cloud.

Read More

Why OAuth Falls Short, Agent Taxonomy and Scenarios that Challenge Security, and Solution Ideas

By Ed Higgins | June 15, 2025

In this posting, let’s explore why OAuth falls short, look at Agent taxonomy, security challenges, and insights that can help.

Read More
What is an AI Platform Blog Feature Image - a processing chip with the letters AI on top

The Rise of Agentic AI

By Ed Higgins | June 13, 2025

Artificial Intelligence has become a household discussion over the last couple of years, especially given the rise of the generative pre-trained transformer (GPT) models, made famous by ChatGPT.

Read More
Case Study Feature Image: Dover Chemical Manufacturing Facility

Rapid Implementation of Dynamics 365 F&O Improves Security at Dover Chemical

By Quisitive | June 9, 2025

See how Dover Chemical transformed its security approach following a ransomware attack, partnering with Quisitive for Dynamics 365 F&O.

Read More
Recap Blog - 4 Key Takeaways HealthSec Summit 2025 - Thumbprint graphic

Strengthening Healthcare Cyber Resilience: Key Takeaways from HealthSec Summit 2025

By Quisitive | June 9, 2025

Learn about the key discussions at the HealthSec Summit, where industry leaders tackled pressing healthcare cybersecurity issues.

Read More
Blog Feature Image - 10 Microsoft 365 Security Best Practices - a lock sitting on a PC keyboard

Maximizing Your Microsoft Security Posture: 10 Microsoft 365 Security Best Practices

By Christophe Foulon | May 22, 2025

Discover 10 essential Microsoft 365 Security Best Practices that safeguard your data and reduce the risk of cyberattacks.

Read More
Blog Feature Image - 6 Key Insights from the Verizon Data Breach Investigations Report 2025

6 Key Insights from the Verizon Data Breach Investigations Report 2025

By Christophe Foulon | May 16, 2025

Explore the key findings of the 2025 Verizon Data Breach Investigations Report and understand emerging cybercrime trends.

Read More
Feature Image Microsoft Purview Governance Strategies Webinar - Sleep Easier with Microsoft Purview, speaker: Ed Higgins

How to Sleep Easier with Microsoft Purview – Strategies for Data Security and Governance

By Quisitive | April 30, 2025

Tune in as experts from Quisitive and Microsoft discuss how Microsoft Purview can help organizations manage and secure their data, ensuring compliance and mitigating risks associated with data breaches and AI usage.

Read More
Blog Feature Image: Secure Remote Work and Hybrid Work with Zero Trust - Part 2 Adopting & Managing a Zero Trust Model for Remote Work

How to Secure Remote and Hybrid Work Environments using the Zero Trust Model Part 2

By Christophe Foulon | April 29, 2025

Transform your cybersecurity approach to enable secure remote work, focusing on user needs and Zero Trust principles. In Part 2 of this series, I’m doing an in-depth review of the final stages of the Zero Trust Adoption Process: Get Ready, Adopt, and Govern & Manage.

Read More