Latest News

We love to share our cybersecurity knowledge with you!

AllGeen categorieAzure securityData protectionIAMModern workplaceStrategyAI

Understanding the NIS2 Directive: A Comprehensive Guide for EU Organizations

A ground-breaking new EU regulation. NIS2 will forever change the European cybersecurity landscape for approximately...
Misa members

SecWise joins Microsoft Intelligent Security Association

At SecWise, we are happy to announce we are now members of the Microsoft Intelligent...

AI is changing the world of cybersecurity

In today’s digital age, cyber security is like a fortress wall, that protects our online...

The Importance of Data Protection and Labelling Policies in Microsoft Azure

Breaches, ransomware, data theft ... All the above are incidents we’re often confronted with as...
Hacker behind screens

Avoid Cyber Incidents from Within with Insider Risk Management

Discover insider threats within your organization. Learn how to protect against cyber risks from employees...

Enhancing Data Security: Microsoft Purview’s Information Protection and Data Loss Prevention

Protect your valuable data with Microsoft Purview's Information Protection and Data Loss Prevention. Learn more...

As long as SecWise keeps challenging me and it’s fun, I don’t see me leaving here anytime soon

Bert Thomas is a Senior Cloud Security Consultant at SecWise. As long as he's challenged...
Working on laptop

Compliance leads to extra customer trust

Over the past two years, the digitisation of our working environment has made great strides...
Microsoft authenticator app

Are you already using MFA Number Matching?

MFA Number Matching is a new feature from Microsoft, and a form of Multi-Factor Authentication...
Defender en XDR-service - security

XDR-service maps attack chain and reduces response time

Defender and XDR service is an added value for security teams who want to be...
Cybersecurity

5 cybersecurity tips that every business should implement

The consequences of a cyberattack can be huge, but with these five cybersecurity tips from...
Security

Watch SOC-service puts your online security on point

Lowie Daniëls works as a cloud security analyst at SecWise, and explains in this blog...
Bjorn Claes - Senior Cloud Security Consultant

Open culture and challenging work are a golden combination

Bjorn Claes is a Senior Cloud Security Consultant at SecWise. He thinks the open culture...
Bert Vanwezer-Calle

I still go home every day with a smile on my face

Bert Vanwezer-Calle is a Cloud Security Analyst at SecWise and still goes home every day...
Maarten De Vos - Cloud Security Consultant

Life at SecWise as a Cloud Security Consultant

Life at SecWise as a Cloud Security Consultant. You can read the story of Maarten...

Arxus and SecWise expand collaboration structurally

Microsoft will effectively begin on After previously collaborating successfully on a project basis, Arxus and...

This year: Microsoft deprecation of Basic Authentication in Exchange Online

Microsoft will effectively begin on October 1, 2022 to turn off basic authentication for exchange...

Major change in Azure AD B2B management

Microsoft recently released something that we consider one of the major updates to Azure AD...

New phishing vector possible in Microsoft Teams

Microsoft annouced on 26 january that they will enable a new collaboration feature with external...

Authentication context: what, why and when?

Conditional Access authentication context is currently in public preview. It is a Zero Trust control...

How to bypass MFA in Azure and O365: part 3

This is part three of three blog posts about bypassing MFA in Azure AD and...

How to bypass MFA in Azure and O365: part 2

This is part two of three blog posts about bypassing MFA in Azure AD and...

How to bypass MFA in Azure and O365: part 1

This is part one of three blog posts about bypassing MFA in Azure AD and...

Why third party application patching is essential

In this blog post, we explain why third party application patching is essential and how...

Moving away from WIP towards Endpoint DLP

In this blog we want to share some insights on Endpoint DLP and what the...

Cloud Security Posture Management: Azure Secure Score

Cloud Security Posture Management (CSPM) is the buzz-word these days although relatively new. It comes...

Pen-testing in Microsoft Azure

Pen-testing is not incredibly complex, but doing it with respect for the rules of engagement...

Remote working: cyber security risks and best practices

COVID-19 has impacted businesses and employees in various ways. One common fact is that we...

Keep control over your corporate data on users’ personal devices

The management of personal devices isn’t always an easy sell within an organization – employees...

Turn off Azure AD ‘Application consent by users’ now

SecWise has seen a growing number of attacks that rely on the application consent default...

Protecting corporate data with Windows Information Protection

As users can access data from anywhere, it is a lot tougher to protect this...

Azure Active Directory: IAM for the future

When talking to customers about Microsoft 365 security, we often kick off with reviewing the...

Microsoft’s Cloud Security license bundles demystified

Microsoft is and has always been keen on offering multiple options to the customer to...

Windows Defender ATP versus traditional antivirus solutions

Many organisations are considering Endpoint Detection Response (EDR) solutions, to improve their security posture against...

Microsoft as security vendor?

Microsoft as security vendor? Are you serious? Microsoft does have a long history with security...