Proper Entra ID Application Governance – Phase 1

Once an organization migrates to the cloud with Microsoft 365, the temptation and ability for an end-user to access potentially threatening external applications can become out of hand and snowball quickly on many levels. Attacks against insecurely configured Microsoft 365 clients have been on the rise recently. One example from last week is email attacks […]