Our Comprehensive Services
Category: Security
Microsoft named an overall leader in KuppingerCole Leadership Compass for ITDR
Searching for the best identity threat detection and response (ITDR) service?
We're pleased to share the news that Microsoft has been recognized as an overall leader in the Kuppinger Cole Leadership Compass Identity Threat Detection and Response: IAM Meets the SOC.
This report looks at Microsoft's strengths ...
Hackers Use Weaponized .HTA Files to Install Red Ransomware
Ransomware groups are using old tactics in new ways. This article details how attackers are using weaponized .HTA (HTML Application) files to deploy Red Ransomware payloads, often disguised as legitimate downloads.
The result? Infected systems, encrypted data, and operational disruption. Read the article to learn how these ...
AI-Powered Phishing Detection – Does It Actually Work?
Phishing attacks remain a leading cause of breaches, and AI promises to stop them. But does it deliver?
This article takes a practical look at how AI-powered phishing detection tools are being used, what challenges persist, and where human analysts still make a difference.
Read the article ...
Domino’s Pizza Enterprises slices identity by role with Microsoft Entra ID
Domino's Pizza Enterprises Ltd. (DPE) has employees around the world, in various job roles and access to different applications and data sources.
These global workers are all governed by disparate identity and access management (IAM) solutions, making it more difficult to manage and monitor user access.
To ...
Criminal Hackers Are Employing AI To Facilitate Identity Theft
AI is accelerating the reach and sophistication of cybercrime. This Forbes article explains how criminal hackers are using generative AI to scale attacks, compromise credentials, and exploit deepfakes for social engineering.
Reading this article will help business leaders recognize emerging AI-driven risks and assess where their current ...
How Can Zero Trust Enhance Your Business’s Cybersecurity?
Our infographic explains Microsoft's zero trust strategy, enhancing security by verifying every user. It's crucial for protecting your data, even if credentials are stolen. How does it work? Get this infographic, and contact FUSION 1 to learn more. Let's help keep your business secure.
View: How Can Zero ...
AI Cybersecurity Threats in 2025: What Companies Fear Most
AI isn't just helping companies innovate; it's giving cybercriminals new tools to exploit. This article offers a forward-looking view of the AI-driven threats companies are most concerned about heading into the future, including deepfake phishing, AI-assisted malware, and real-time impersonation attacks.
Read the article to understand what's ...
Strengthen your business with Microsoft Secure Access Solutions
Cyber criminals are constantly inventing new and more sophisticated threats, from ransomware cleverly hidden in an email attachment to a multi-phased threat that will sit in your system for weeks letting attackers download data and corrupt files. These threats are a huge risk for your business.
In ...
The four stages of creating a trust fabric with identity and network security
This interesting article from Microsoft will help you understand the four stages of creating a digital trust "fabric" to strengthen security for your distributed enterprise.
Zero trust is an approach to security that continuously monitors and authenticates users and applications to make sure they are, in fact, ...
How implementing a trust fabric strengthens identity and network
Ensuring that only authorized end users and applications can access your enterprise data is fundamental to strong IT security.
But traditional identity access management (IAM) security comes with multiple challenges, including the rise of AI deepfakes and other AI-enabled threats.
In this article, Microsoft explains its zero-trust ...