Listen "S3 E9 Why Microsoft 365 is difficult"
Episode Synopsis
The Microsoft 365 environment is complex to administer from a cybersecurity perspective. There are very expensive options from Microsoft that add advanced security elements to the 365 environment. In addition to cost, ease of use and knowledge can become limiting factors dependant on the capability of the organization when implementing Microsoft's advanced security. Dark Rhino Security and Infocyte partnered to build a managed service offering that dramatically simplifies the evaluation, compilation, and remediation of security gaps present in a companies Microsoft 365 environment. Chris Auger from Infocyte and Tyler Smith, a co-founder of Dark Rhino Security, host this episode of Security Confidential and explain how to benchmark against the CIS standards a Microsoft 365 environment and how to remediate the gaps in a simplified manner. The end result is a highly secure Microsoft 365 environment.
Chapter Markers
00:14 Introduction
03:10 Microsoft 365 Security Overview
04:50 Why Microsoft 365 is difficult
05:30 Why set it and forget is the wrong answer
08:00 Anatomy of an attack, attack chain
13:20 The attack vectors
15:33 Cost structure of M365 tools
20:15 Dark Rhino Security Microsoft 365 Security Assessment
23:48 Security controls analyzed as part of assessment
25:08 Value of Dark Rhino Security in the Process
26:15 Is Tenable used under the hood?
27:15 Does MFA solve the security gaps?
29:35 What is out of domain forwarding and will they block it?
32:47 Does Small Business really have the risk
42:35 Timeline for Assessments
The Video for this episode can be found at https://youtu.be/KWSVZhUFM-Y
To get the free vulnerability scan of up to 10,000 nodes in your network call Dark Rhino Security at 614.401.3025 or visit https://www.darkrhinosecurity.com or email [email protected]
Chapter Markers
00:14 Introduction
03:10 Microsoft 365 Security Overview
04:50 Why Microsoft 365 is difficult
05:30 Why set it and forget is the wrong answer
08:00 Anatomy of an attack, attack chain
13:20 The attack vectors
15:33 Cost structure of M365 tools
20:15 Dark Rhino Security Microsoft 365 Security Assessment
23:48 Security controls analyzed as part of assessment
25:08 Value of Dark Rhino Security in the Process
26:15 Is Tenable used under the hood?
27:15 Does MFA solve the security gaps?
29:35 What is out of domain forwarding and will they block it?
32:47 Does Small Business really have the risk
42:35 Timeline for Assessments
The Video for this episode can be found at https://youtu.be/KWSVZhUFM-Y
To get the free vulnerability scan of up to 10,000 nodes in your network call Dark Rhino Security at 614.401.3025 or visit https://www.darkrhinosecurity.com or email [email protected]
More episodes of the podcast Security Confidential
S18 E02 (VIDEO) Hackers are using ChatGPT
04/12/2025
S18 E02 Hackers are using ChatGPT
04/12/2025
S18 E01 How Hackers Target National Security
06/11/2025
S18 E0 (VIDEO) Data Poisoning
09/10/2025
S18 E0 Data Poisoning
08/10/2025
S17 E09 (VIDEO) The Hacker's Playbook
11/08/2025
S17 E09 The Hacker’s Playbook
06/08/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.