Security "Bits"

Chris Higgins

Recent Posts

Microsoft Workplace Join Part 2: Defusing the Security Timebomb

By Chris Higgins  |  April 30, 2018 at 4:59 AM  | 

Good News on Black-Golden Watch Face with Closeup View of Watch Mechanism.

In my last post, I introduced Microsoft Workplace Join. It’s a really convenient feature that can automatically log users in to corporate accounts from any devices of their choosing. However, this approach essentially eliminates all sense of security.

So, if you’re a sane and rational security professional (or even if you’re not), you clearly want to disable this feature immediately. Your options?

Read More

Microsoft Workplace Join Part 1: The Security Timebomb

By Chris Higgins  |  April 25, 2018 at 4:48 AM  | 

Risk on Black-Golden Watch Face with Watch Mechanism. Full Frame Closeup.

It’s no secret that enterprise users wish to access work data and applications from a mix of both corporate and personal devices. In order to help facilitate this mix of devices, Microsoft has introduced a new feature called Workplace Join into Azure Active Directory, Microsoft’s cloud-based directory and identity service. While the intent of streamlining user access to work-related data is helpful, the delivery of this feature has resulted in a large security gap - one that can’t easily be disabled. This is another example of an app vendor optimizing for user experience ahead of appropriate controls and protections - demonstrating the basis for the cloud app shared responsibility model and the need for third party security solutions like cloud access security brokers (CASBs).

Read More

How One Company Thwarted an Office 365 Account Hijack with a CASB

By Chris Higgins  |  April 24, 2017 at 12:00 PM  | 

jay-wennington-2250.jpgIt is becoming more commonplace to hear of cyber attacks that compromise large sets of user data. Hackers have many different attack vectors in their arsenal. These range from complex attacks to simple phishing attacks yielding login credentials for a privileged user. Individuals in executive positions (CXO, VP, etc) and in IT operational roles are likely to have privileged access to information systems.

Read More


see all