CPI Consulting
  • About
  • Blog
  • BI-Weekly Insights
  • Microsoft Intune & Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses

The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses

by CPI Staff | Feb 16, 2026 | Blog, Microsoft 365 Security

In this blog post The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses we will cover the most common (and fixable) security holes we see in organisations with 50–500 staff—especially those running Microsoft 365 and Azure—and what to do about them. If...
How to Use Microsoft Graph Security API

How to Use Microsoft Graph Security API

by CPI Staff | Jul 23, 2024 | Blog, Microsoft 365 Security, Microsoft defender XDR, Microsoft Graph API, Microsoft Graph security API

In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts. Microsoft Defender Extended Detection and Response (XDR) is an enterprise end-to-end security solution that detects, prevents,...
How to Prevent Microsoft 365 Emails from Blacklisting

How to Prevent Microsoft 365 Emails from Blacklisting

by CPI Staff | Jul 15, 2024 | Blog, Email Security, Microsoft 365, Microsoft 365 Security

In this Microsoft 365 Email Security article, we will explain how to prevent Microsoft 365 emails from blacklisting. As an IT consultancy in the Microsoft 365 space, we help Microsoft 365 customers that get affected by anti-spam systems that blacklist and graylist...
Configure Email Security Quarantine Policy in Microsoft 365

Configure Email Security Quarantine Policy in Microsoft 365

by CPI Staff | Jul 3, 2024 | Blog, Microsoft 365 Security

In this Microsoft 365 Security blog post, we will explain how to configure email security quarantine policy in Microsoft 365. Microsoft 365 email quarantine is a security feature that isolates suspicious emails detected by spam filters and phishing detectors from...

Recent Posts

  • Anthropic, OpenAI, and Google Are All Locking In Enterprise Customers. How to Manage Vendor Risk
  • Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected
  • Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users
  • Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now
  • How AI Is Expanding the Attack Surface for Mid-Market Organisations
  • The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance
  • Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools
  • OpenAI’s Superapp Strategy Signals Platform Lock-In at Scale
  • How OpenAI’s New Safety Program Changes Enterprise AI Risk Profiles
  • Anthropic’s Economic Index Reveals a Widening AI Skills Gap. Early Adopters Are Pulling Further Ahead.

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune