Get Customised Security Posture Templates Tailored to your Needs - Join our Early Adopter Program

Blogs

Get the latest articles on securing 365 and your business

How to Achieve Desired State Configuration without Managing PowerShell Code

Desired State Configuration is a powerful management capability, however, it comes with its own set of challenges. Learn the obstacles in DSC and how to overcome these with Octiga's SaaS automation engine.

Read Story

Cyber Security Approach for SMEs

Cybersecurity is essential, but does it always have to be expensive? Find out these helpful cybersecurity tips for the workplace in SMEs and other organisations.

Read Story

Recent News

Visit Blog

How were we Hacked? Part 1

Do words like password spraying, phishing, credential stuffing make you feel vulnerable? Get into the mind of your hacker and understand how hackers hack passwords.

Read Story