SOLUTION ARCHIVE

Security

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Log4J – What you should know

By Ed Higgins | December 10, 2021

If you are concerned that you may be exposed to Log4j vulnerabilities or simply don’t know if you are exposed, read our blog now.

Read More

Integrating on-prem security information to Azure Sentinel via SCOM

By Cameron Fuller | October 20, 2021

We are excited to announce the release of On-Prem Security Monitoring for Sentinel! Read our blog and discover our management pack.

Read More

Introducing Azure Sentinel

By Cameron Fuller | May 10, 2021

Welcome to the “Introducing” series. In this blog post, we will introduce Azure Sentinel, a security solution created by Microsoft.

Read More
A lock is overlaid on a design of connected lines. This represents the need for Microsoft 365 and Azure security. Learn how to improve security using built in features in this article.

Azure Security and Compliance: How to Improve Security Using Built-In Microsoft 365 and Azure Features

By Quisitive | April 8, 2021

Learn 4 ways to improve Microsoft 365 and Azure security for your organization using built-in features.

Read More

Consent-Phishing Attacks – It’s a Thing

By Quisitive | March 10, 2021

We provide assistance to identify consent-phishing threats among many and implement protections for them. See how we can help you today.

Read More

Using ConfigMgr Compliance to Manage Security Configuration Baselines (Part 1)

By Quisitive | February 2, 2021

In this blog series, we will walk you through how to use ConfigMgr Compliance to manage Security Configuration Baselines.

Read More

Detecting the SolarWinds Compromise Signals with Active Directory PowerShell

By Matthew Dowst | December 14, 2020

In this blog, you’ll see a few scripts that may help you quickly identify suspicious activity using Active Directory PowerShell.

Read More
A women uses her smart phone to browse the internet while wearing a mask. This article outlines common online security risks that have gained popularity during the COVID-19 pandemic

The Online Security Risks of the COVID-19 Pandemic

By Quisitive | July 16, 2020

More than ever before, online security risks should be assessed and addressed to protect employees as they work from home. Learn more in this article.

Read More
Image of someone at a computer with an icon of a lock overlaid on the image. This represents the need for security and privacy enhancing tools in the modern world

Security and Privacy Enhancing Tools

By Quisitive | June 8, 2020

In this article, Quazi Rahman outlines different types of tools to improve your privacy and security while browsing the internet.

Read More
Image of a young child doing online schooling. Read how to keep your kids safe online with this blog post

Four Ways to Keep Your Kids Safe Online

By Quisitive | May 5, 2020

Cyber criminal technologies are becoming more and more sophisticated. Here are four tips you can use to help keep your kids safe online.

Read More