Blocking M365 Data exfiltration: Conditional Access
Blocking M365 Data exfiltration: Conditional Access

From time to time, customers have the Ask to allow access to Microsoft 365 on devices not managed by their Organisation. Whether it is because of a bring-your-own-device (BYOD) strategy, the desire to access work files on the go, collaborating with guests, or a multitude of other reasons. Specifically for VDI: Allow use of the... » read more

My AI-Free Notes for the “Microsoft Build” Event
My AI-Free Notes for the “Microsoft Build” Event

The Microsoft Build event is one of the most important events for developers and IT professionals worldwide. Each year, new innovations and technologies from the Microsoft ecosystem are presented. Although the focus is on developers, in the Microsoft Cloud world, practically all areas now seamlessly merge. Therefore, it is wrong to expect topics exclusively relevant... » read more