Latest News
We love to share our cybersecurity knowledge with you!
Understanding the NIS2 Directive: A Comprehensive Guide for EU Organizations
A ground-breaking new EU regulation. NIS2 will forever change the European cybersecurity landscape for approximately...
SecWise joins Microsoft Intelligent Security Association
At SecWise, we are happy to announce we are now members of the Microsoft Intelligent...
AI is changing the world of cybersecurity
In today’s digital age, cyber security is like a fortress wall, that protects our online...
The Importance of Data Protection and Labelling Policies in Microsoft Azure
Breaches, ransomware, data theft ... All the above are incidents we’re often confronted with as...
Avoid Cyber Incidents from Within with Insider Risk Management
Discover insider threats within your organization. Learn how to protect against cyber risks from employees...
Enhancing Data Security: Microsoft Purview’s Information Protection and Data Loss Prevention
Protect your valuable data with Microsoft Purview's Information Protection and Data Loss Prevention. Learn more...
As long as SecWise keeps challenging me and it’s fun, I don’t see me leaving here anytime soon
Bert Thomas is a Senior Cloud Security Consultant at SecWise. As long as he's challenged...
Compliance leads to extra customer trust
Over the past two years, the digitisation of our working environment has made great strides...
Are you already using MFA Number Matching?
MFA Number Matching is a new feature from Microsoft, and a form of Multi-Factor Authentication...
XDR-service maps attack chain and reduces response time
Defender and XDR service is an added value for security teams who want to be...
5 cybersecurity tips that every business should implement
The consequences of a cyberattack can be huge, but with these five cybersecurity tips from...
Watch SOC-service puts your online security on point
Lowie Daniëls works as a cloud security analyst at SecWise, and explains in this blog...
Open culture and challenging work are a golden combination
Bjorn Claes is a Senior Cloud Security Consultant at SecWise. He thinks the open culture...
I still go home every day with a smile on my face
Bert Vanwezer-Calle is a Cloud Security Analyst at SecWise and still goes home every day...
Life at SecWise as a Cloud Security Consultant
Life at SecWise as a Cloud Security Consultant. You can read the story of Maarten...
Arxus and SecWise expand collaboration structurally
Microsoft will effectively begin on After previously collaborating successfully on a project basis, Arxus and...
This year: Microsoft deprecation of Basic Authentication in Exchange Online
Microsoft will effectively begin on October 1, 2022 to turn off basic authentication for exchange...
Major change in Azure AD B2B management
Microsoft recently released something that we consider one of the major updates to Azure AD...
New phishing vector possible in Microsoft Teams
Microsoft annouced on 26 january that they will enable a new collaboration feature with external...
Authentication context: what, why and when?
Conditional Access authentication context is currently in public preview. It is a Zero Trust control...
How to bypass MFA in Azure and O365: part 3
This is part three of three blog posts about bypassing MFA in Azure AD and...
How to bypass MFA in Azure and O365: part 2
This is part two of three blog posts about bypassing MFA in Azure AD and...
How to bypass MFA in Azure and O365: part 1
This is part one of three blog posts about bypassing MFA in Azure AD and...
Why third party application patching is essential
In this blog post, we explain why third party application patching is essential and how...
Moving away from WIP towards Endpoint DLP
In this blog we want to share some insights on Endpoint DLP and what the...
Cloud Security Posture Management: Azure Secure Score
Cloud Security Posture Management (CSPM) is the buzz-word these days although relatively new. It comes...
Pen-testing in Microsoft Azure
Pen-testing is not incredibly complex, but doing it with respect for the rules of engagement...
Remote working: cyber security risks and best practices
COVID-19 has impacted businesses and employees in various ways. One common fact is that we...
Keep control over your corporate data on users’ personal devices
The management of personal devices isn’t always an easy sell within an organization – employees...
Turn off Azure AD ‘Application consent by users’ now
SecWise has seen a growing number of attacks that rely on the application consent default...
Protecting corporate data with Windows Information Protection
As users can access data from anywhere, it is a lot tougher to protect this...
Azure Active Directory: IAM for the future
When talking to customers about Microsoft 365 security, we often kick off with reviewing the...
Microsoft’s Cloud Security license bundles demystified
Microsoft is and has always been keen on offering multiple options to the customer to...
Windows Defender ATP versus traditional antivirus solutions
Many organisations are considering Endpoint Detection Response (EDR) solutions, to improve their security posture against...
Microsoft as security vendor?
Microsoft as security vendor? Are you serious? Microsoft does have a long history with security...