Loading...

Loading...

Security

8 articles

Latest

Decentralized Identity and interoperability: What you need to know

Posted by Dr. Elias Ekonomou on June 16, 2022

Find out how you can achieve interoperability across all identity systems without compromising security.

READ MORE

Watch decentralized identity in action

Posted by Dr. Elias Ekonomou on February 15, 2022

Watch this video and learn why decentralized identity is the future of identity online and is enabling use cases currently impossible with proprietary systems.

READ MORE

Biometrics: The catalyst of success for decentralized identity

Posted by Dr. Elias Ekonomou on November 10, 2021

This blog post explores the integration of verifiable credentials with biometric matching to enable Identity Proofing with a high level of assurance.

READ MORE

Beware of new elaborate phishing methods

Posted by Farhad Mahmudov on October 5, 2021

Avanade’s Security expert explains in detail how organizations can protect themselves against new, sophisticated spear phishing and whaling security attacks.

READ MORE

Adopt Zero Trust security model for an agile security posture

Posted by Rajinder Singh Saini on August 4, 2021

Learn why adopting the Zero Trust model is something all organisations should consider to guard against rising cyber security attacks.

READ MORE

A quick hack to bulk-label data in Sharepoint Online and Microsoft Teams

Posted by Munib Rehman on May 4, 2021

Learn to easily mass-label content in SharePoint Online (SPO) without matching to specific sensitive information types - with PowerShell and without PowerShell.

READ MORE

Protecting your messaging environment against zero-day exploits

Posted by Farhad Mahmudov on April 7, 2021

Protect your messaging systems from hacking exploits and zero-day vulnerabilities with Microsoft Defender for Endpoint & other security-related best practices.

READ MORE

Security and your commerce implementation

Posted by Sam Braid on August 21, 2019

Commerce implementations face a variety of security concerns today. Consider these countermeasures to mitigate some threats.

READ MORE

Techs and Specs Newsletter

Stay up to date with our latest news.

Contact Avanade

Next steps

Talk to us about how we can bring the power of digital innovation to your business.

Share this page