TAG ARCHIVE

Blog

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
A man sits in the office and chats with his Dynamics consultants about Dynamics 365 Pricing

Dynamics 365 2025 Release Wave 2: Key Updates and What They Mean for Your Business

By Quisitive | August 19, 2025

Discover what’s new in Dynamics 365 2025 Release Wave 2. From AI to automation, Quisitive helps you unlock features and maximize value.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
Preparing Your Business for CMMC 2.0 Compliance

Preparing Your Business for CMMC 2.0 Compliance While Safeguarding Your Sensitive Assets

By Christophe Foulon | August 15, 2025

Learn the key steps to achieve CMMC 2.0 compliance and protect your business while staying ready for DoD contract requirements.

Read More

Microsoft Is Retiring SharePoint 2013 Workflows – Here’s What That Means for Nintex Users

By Quisitive | August 1, 2025

Don’t wait until the deadline hits. SharePoint 2013 workflows are being retired, and if your business still depends on them, you need a transition plan. This guide outlines the key dates, risks, and your options.

Read More
Featured Image - EverWatch

​​​Inside the Cockpit: How Quisitive Operates the EverWatch Tie Fighter​

By Cameron Fuller | July 28, 2025

See how Quisitive’s EverWatch monitors Azure in real-time and how our team manages alerts, triage, automation, and diagnostics.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More
EverWatch Azure Monitoring Solution Blog 2 Feature Image

​​​Deploying the Tie Fighter: Introducing the EverWatch Azure Monitoring Solution​

By Cameron Fuller | July 15, 2025

With EverWatch, you can ensure that your systems are running smoothly and efficiently. The Quisitive solution is designed to assist in managing resources more efficiently, offering insights for making informed decisions.

Read More
A shield deflects an attack to symbolize using Vulnerability Remediation best practices to improve your Cloud Security posture

Improving Your Cloud Security Posture with Vulnerability Remediation: 10 Best Practices for the Modern Enterprise

By Christophe Foulon | July 2, 2025

Discover key vulnerability remediation best practices to enhance your security posture and minimize potential business risks.

Read More
Blog Feature Image - Legos and Azure Monitoring - Lego Tie Fighter Box

4 Lessons Legos Taught Me About Monitoring Azure

By Cameron Fuller | July 2, 2025

Understand the importance of Azure monitoring and learn best practices for maintaining your cloud environment, all through the lens of Legos.

Read More