Access Everywhere: Notes on Cyber Security from DEF CON 33

The 2025 DEF CON hacker conference, officially DEF CON 33, took place last August in Las Vegas with the theme, “Access Everywhere”. The event drew more than 30,000 cybersecurity professionals, researchers, and enthusiasts for presentations, workshops, networking, and competitions. DARPA’s AI Cyber Challenge The centerpiece of this year’s event was the conclusion of the AI… Continue reading Access Everywhere: Notes on Cyber Security from DEF CON 33

Why SaaS Is More Secure Than You Might Think: Debunking Myths and Understanding the Modern Cloud Advantage

When cloud software first entered the mainstream, many organizations were understandably cautious. Entrusting critical business data to someone else’s servers seemed risky — especially for companies that had long kept systems locked away in on-premises data centers under their own control. But today, that perception has changed. As technology and cyber threats have evolved, it… Continue reading Why SaaS Is More Secure Than You Might Think: Debunking Myths and Understanding the Modern Cloud Advantage

Is Business Central Secure? A Look at Microsoft’s Cloud Protections

When your organization runs its entire business on a cloud-based ERP like Microsoft Dynamics 365 Business Central, trust in its security is essential. You’re managing the lifeblood of your company: financial data, customer information, supply chain operations, and proprietary insights. So, is Business Central truly secure enough to protect all of it? The short answer… Continue reading Is Business Central Secure? A Look at Microsoft’s Cloud Protections

How AI is Changing Cybersecurity Risk – for Better and for Worse

Artificial intelligence (AI) introduces a range of new attack surfaces and fresh governance obligations. Business and IT leaders face three simultaneous challenges: Protecting AI as an asset, utilizing AI to defend against cyberattacks, and defending against AI-enabled attackers. The stakes are high. The World Economic Forum’s Global Cybersecurity Outlook 2025 identifies emerging technologies (especially generative… Continue reading How AI is Changing Cybersecurity Risk – for Better and for Worse

A Survey of the Changing Landscape of Cybersecurity in 2025

The cybersecurity landscape continues to evolve at a breakneck pace. Advanced AI techniques, geopolitical tensions, sprawling digital perimeters, and regulatory shifts are reshaping the threat and defense paradigm. According to the World Economic Forum’s Global Cybersecurity Outlook 2025, 72% of organizations report an increase in cyber risk, and nearly half (47%) cite advances in generative… Continue reading A Survey of the Changing Landscape of Cybersecurity in 2025

Managing User Permissions in Dynamics 365 Business Central

Managing Permissions and Security Groups in Dynamics 365 Business Central – Part III In previous blogs, we have discussed techniques for managing permission sets and security groups in Microsoft Dynamics 365 Business Central. The main idea is to define permission sets and security groups that will enable all job-related functions to be performed, and then… Continue reading Managing User Permissions in Dynamics 365 Business Central

Brute Force Password Cracking: How Businesses Can Stay Protected

In today’s digital business environment, passwords remain the first—and sometimes only—line of defense that stands between cybercriminals and sensitive business data. Among the many tactics used to compromise credentials, brute-force password cracking remains one of the most persistent and dangerous threats. While not the most sophisticated method, brute force attacks are relentless and increasingly automated,… Continue reading Brute Force Password Cracking: How Businesses Can Stay Protected

Managing Permissions and Security Groups in Dynamics 365 Business Central – Part II: Security Groups

In the first part of this series, Managing Permissions and Security Groups in Dynamics 365 Business Central – Part I, we discussed how to define your own permission sets in Business Central. Our focus in this series concerns granting users permission to view, edit, and delete Table Data, since this is a critical area where… Continue reading Managing Permissions and Security Groups in Dynamics 365 Business Central – Part II: Security Groups

Managing Permissions and Security Groups in Dynamics 365 Business Central – Part I: Permission Sets

Managing security in Microsoft Dynamics 365 Business Central is one of the most critical—and often overwhelming—tasks for administrators. Giving users too much access to data can lead to errors or fraud, while giving them too little access can prevent employees from performing essential job functions. Whether you’re preparing for an implementation, cleaning up after go-live,… Continue reading Managing Permissions and Security Groups in Dynamics 365 Business Central – Part I: Permission Sets

Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls