12 aug 2021 How to bypass MFA in Azure and O365: part 3

This is the third and last part of our series about how to bypass MFA in Azure and O365. In this article, we share our advice on how you defend your organization against the attacks we described in parts 1 and 2.

26 jul 2021 Authentication context: what, why and when?

Conditional Access authentication context is currently in public preview. It is a Zero Trust control plane that allows you to apply different access policies within all apps. Why, when, how do we use it?

12 jul 2021 Pen-testing in Microsoft Azure

Pen-testing is not incredibly complex, but doing it with respect for the rules of engagement, state rules, etc. can be very challenging.

24 jun 2021 How to bypass MFA in Azure and O365: part 2

In the first part of this series about how to bypass MFA in Azure and O365, we discussed how SSO works and how an attacker can abuse this. In this second part, we elaborate on a more complex attack technique based on MFA in Azure and O365.

07 jun 2021 How to bypass MFA in Azure and O365: part 1

This is part one of three blog posts about bypassing MFA in Azure AD and Office 365. In this first part of three, we explain how the Single Sign On (SSO) works and how an attacker might abuse this.

25 mei 2021 Why third party application patching is essential

In this blog post, we explain why third party application patching is essential and how we approach this topic at SecWise. Are you looking to implement a similar framework or do you need help with getting started? Do not hesitate to reach out without any obligation.

26 apr 2021 Moving away from WIP towards Endpoint DLP

In this blog we want to share some insights on Endpoint DLP and what the advantages are regarding Windows Information Protection (WIP). When it comes to protection of data on Windows 10 endpoints, we used to look at WIP which allowed us to configure policies for enlightened apps.


Cloud Security Posture Management (CSPM) is the buzz-word these days although relatively new. It comes in different flavors, different tools, all depending on your security needs. CSPM enables you to avoid misconfigurations that can potentially lead to data leakage(s).

14 dec 2020 Secwise doet voor FIT cyberdeuren op slot

In 2015 trok Flanders Investment & Trade een IT-strategie op gang die hen stelselmatig naar de cloud zou brengen. Tegelijk kwam er naast de traditionele, centrale perimeterbeveiliging ook aandacht voor decentrale cyberveiliging. Na verschillende security-audits en evaluatie van een aantal beveiligingstoepassingen koos FIT voor de beveiligingssuite van Microsoft 365 Defender.

10 dec 2020 GO! wint een halftijdsequivalent met nieuwe securitytoepassing van Microsoft

Anderhalf jaar geleden werd het Gemeenschapsonderwijs het slachtoffer van digitale inbraakpogingen. Met name de software voor virtuele desktops werd geviseerd. Voor ICT-manager Jan Buytaert was dat niet alleen het finale signaal om de migratie naar Microsoft Azure en Microsoft Office 365 te versnellen, het was ook de aanleiding om cyberbeveiliging wat steviger in handen te nemen.

14 mei 2020 Remote working: cyber security risks and best practices

COVID-19 has impacted businesses and employees in various ways. One common fact is that we all tumbled into the sudden need to work remotely. But without the appropriate controls, new risks will unintentionally be introduced into your organization. Work remotely in a secure manner with our top 5 threat checks.

07 apr 2020 Keep control over your corporate data on users’ personal devices

The management of personal devices isn’t always an easy sell within an organization – employees are often reluctant to have their personal device managed by their employer. Luckily, there is Microsoft Application Management (MAM), which helps companies secure corporate data on mobile devices.

02 jan 2020 Turn off Azure AD ‘Application consent by users’ now!

SecWise has seen a growing number of attacks that rely on the application consent default configuration in Azure AD, which allows threat actors to get access to users’ data, mails and more. It is strongly advised to turn off this feature as soon as possible!

21 okt 2019 Protecting corporate data with Windows Information Protection

As users can access data from anywhere, it is a lot tougher to protect this data, especially for BYOD users that are accessing corporate data from their personal devices. Microsoft has built Windows Information Protection (WIP), to help organizations easily protect their corporate data accessed from unmanaged devices. WIP allows you to define and enforce policies to apps.

13 mrt 2019 Azure Active Directory: IAM for the future

When talking to customers about Microsoft 365 security, we often kick off with reviewing the security of Azure Active Directory. Whether you are using O365 (E1 or E3), Intune (or any other product from the EMS Suite) or Azure IaaS and PaaS services, you already have Azure Active Directory! In this blogpost, we highlight the most important Azure AD features that you should be aware of.

19 feb 2019 Microsoft’s Cloud Security license bundles demystified

Microsoft is and has always been keen on offering multiple options to the customer to acquire their different tools. The only downside to this strategy is that it is often complicated to find the best fit from a customer’s point of view. Therefore, we’ll demystify the license bundles in this blog, focusing on the different security solutions in the bundles.

15 nov 2018 Windows Defender ATP versus traditional antivirus solutions

Many organisations are considering Endpoint Detection Response (EDR) solutions, to improve their security posture against the many threats of today. In this blog post, we explain why your traditional antivirus (AV) solutions cannot cope with the actual threats of today and why Windows Defender ATP would be an excellent alternative.

27 sep 2018 Microsoft as a security vendor?

Microsoft as security vendor? Are you serious? Microsoft does have a long history with security. This blog might help you understand why we at SecWise believe that Microsoft Security solutions can help many customers with their security challenges.