ADSelfService Plus | January 2, 2026Understanding MFA bypass codes: Risks and best practicesMulti-factor authentication (MFA) is widely regarded as the gold standard for identity protection. Yet despite its broad adoption, attackers continue...
Applications Manager | January 2, 2026Mastering Azure monitoring: Strategies for peak cloud performance Running workloads on Azure isn’t just about deploying VMs, databases, or App Services; it’s...
ADSelfService Plus | January 1, 2026Is passwordless authentication safe?Passwords used to be considered the gatekeepers of digital identity, yet they've turned out to be one of its...
General | January 1, 2026Top tips: How small IT organizations can save big on development costsTop tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead....
ADManager Plus | December 31, 2025What is access rights management, and how is it different from access control?Access rights management (ARM) is the overarching governance and administrative discipline...
General | December 31, 2025Engineering balance at scale: Lessons from IT’s year of paradoxesLooking back at 2025, one thing becomes clear: IT teams were repeatedly asked to hold two...
General | December 30, 2025AI-generated media: What's the point?If you have even a minor social media presence, you've probably been unfortunate enough to...
ADSelfService Plus | December 29, 2025What is Microsoft Dynamic Access Control?Traditional access control in Windows environments has long relied on security groups and...
ADSelfService Plus | December 26, 2025Magic links for simplified passwordless authentication A magic link is a unique, time-sensitive URL that lets users securely log in to an...
General | December 25, 2025 Top tips for building a knowledge-sharing culture Top tips is a weekly column where we highlight what’s trending in the tech world and list...