Articles Providing relevant, practical guidance

Filter articles by |     Enter searched keyword: Reset
Are you looking after your application security?

We talk a lot about perimeter security, zero trust, etc. And there’s a good reason for it. Malware attacks don’t jus...

What to do after Microsoft Identity Manager?

MIM (formerly Forefront Identity Manager, and Identity Lifecycle Manager before that) is a widely used service for manag...

4 tools for Azure AD identity governance

Managing user identities and access is a struggle for many organizations. One of the ways to ensure the security of your...

Robert Przybylski
10 practical tips for FIDO2 devices

Lately, I’ve been getting a lot of questions regarding security keys. At Predica, we’ve also been talking about pass...

Robert Przybylski
How to work with Microsoft Teams in multiple organizations?

Microsoft Teams went viral during the pandemic. It became one of the key tools used for collaboration and teamwork.  ...

What to do after a ransomware attack? A guide for enterprises

Nobody's safe. Your organization, sooner or later, will face a security incident. I know it is a bold statement, but ...

Cybersecurity landscape in 2021

As we're moving into the summer months, I prepared for you a round-up of key trends in cybersecurity that I've observed ...

What is Zero Trust security?

What's your network's weakest link? The answer is simple: your users. That's why there's a lot of talk about Zero Tru...

How to spot a phishing email & what to do if you fall for it

Let’s play a little game. This should be fun. Take a look at this message I got recently. Try to find 3 things that...

Azure Security Center or Azure Sentinel? Do we need both for improved security operations?

We live in a rapidly changing world with fast-progressing technologies. Every day new products and innovations force bus...

Maciej Wierzbicki
So, You Want To Buy Microsoft Cloud Services… But How?

Cloud services make many things easier, but first things first – you need to start with buying the right package for y...

How to automate user management in Cisco Unified Communications Manager?

User management can take a lot of time when not done automatically. Especially for large organizations, assigning users ...

Mike Wirth
What’s new in Microsoft Teams guest access policy?

Videoconferences and Teams chats are now an irreplaceable part of the working life for many of us. But Microsoft Teams a...

4 cybersecurity trends for the 2020s

Top 4 cybersecurity trends for the 2020s Today I want to share a few thoughts about the current and future state of cyb...

Azure AD, B2B, B2C Puzzled Out – What Makes The Difference?

Looking at questions on the Internet (on sites like Quora or StackOverflow), I see a growing number of people confused b...

Introducing cloud governance – in a practical video series!

“Let's move to the cloud! Let’s digitize everything!”, they said. And not long after, you're pulling your hair out...

Predica
Cloud migration problems? See how to deal with them!

Cloud services are said to become an almost $300B industry this year. Given the scale of adoption worldwide, this is not...

Predica
How to conquer access governance: A 5-step guide

Have you ever had to respond to this question: "who has access to this file"? It seems easy, doesn't it? Surely, reporti...

Want more practical advice?
Visit our knowledge base for additional resources