TAG ARCHIVE

Blog

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Two colleagues sitting at a table in a café, looking at a laptop together. One person is pointing at the screen while the other listens, both wearing glasses.

Modernizing User Management: Microsoft’s Lifecycle Transformation with Entra and API Workflow

By Michael Leach | August 26, 2025

From onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
A man sits in the office and chats with his Dynamics consultants about Dynamics 365 Pricing

Dynamics 365 2025 Release Wave 2: Key Updates and What They Mean for Your Business

By Quisitive | August 19, 2025

Discover what’s new in Dynamics 365 2025 Release Wave 2. From AI to automation, Quisitive helps you unlock features and maximize value.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
Hands typing on a keyboard with the lock and log-in form in the middle.

10 Cloud Network Security Best Practices to Protect Your Business

By Christophe Foulon | August 18, 2025

Lock down your cloud and protect your business with these real-word best practices, backed by industry standards.

Read More
Preparing Your Business for CMMC 2.0 Compliance

Preparing Your Business for CMMC 2.0 Compliance While Safeguarding Your Sensitive Assets

By Christophe Foulon | August 15, 2025

Learn the key steps to achieve CMMC 2.0 compliance and protect your business while staying ready for DoD contract requirements.

Read More

Microsoft Is Retiring SharePoint 2013 Workflows – Here’s What That Means for Nintex Users

By Quisitive | August 1, 2025

Don’t wait until the deadline hits. SharePoint 2013 workflows are being retired, and if your business still depends on them, you need a transition plan. This guide outlines the key dates, risks, and your options.

Read More
Featured Image - EverWatch

​​​Inside the Cockpit: How Quisitive Operates the EverWatch Tie Fighter​

By Cameron Fuller | July 28, 2025

See how Quisitive’s EverWatch monitors Azure in real-time and how our team manages alerts, triage, automation, and diagnostics.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More