Filter By Topic
Filter By Industry

Why Risk-Based Conditional Access Is the Future of IAM

This blog post explores how risk-based conditional access policies can provide stronger, context-aware security while improving UX.

Maintain Cybersecurity Continuity During Organizational Shifts

Learn how organizational changes create unique cybersecurity vulnerabilities that threat actors can exploit.

Centric Consulting Uses Azure D&A and Microsoft Expertise to Power Growth at Maas Energy Works

We transformed renewable-energy client Maas Energy Works from a G-Suite startup to a Microsoft-aligned enterprise.

Use Risk Visualization Tools to Identify Cybersecurity Threats

Learn how modern risk visualization tools are revolutionizing cybersecurity threat identification with intuitive visual representations.

What’s the Difference Between Audit and Assurance Services?

Learn the difference between the concepts of audit and assurance services and discover their distinct purposes and business value.

Common Cybersecurity Risks of Legacy ERP Systems (And How to Mitigate Them)

Learn about legacy system cybersecurity risks for you enterprise resource planning systems and what you can do to protect against those risks.

Cybersecurity Expert Shares Multicloud Security Expertise in CSO Online

Centric Consulting Director of Security Services Brandyn Fisher was featured in CSO Online’s guide for mastering multicloud security.

Overlooked Cybersecurity Risks of Mergers and Acquisitions

Explore the overlooked cybersecurity risks in mergers and acquisitions. We highlight the critical role of cybersecurity during due diligence.

Cybersecurity Risk Quantification: How to Estimate the True Cost of a Breach

In this blog, we explain why cybersecurity risk quantification’s importance in assessing breaches’ financial impact.

Lead with Balance: How Today’s Leaders are Investing and Optimizing: Webinar Recap

In today's economic uncertainty, business leaders face an impossible balancing act: fuel growth while resources shrink.

Protect More, Spend Less: A Leader’s Guide to Cybersecurity Cost Optimization

Learn about cybersecurity costs and strategies that highlight the importance of avoiding overlapping tools and addressing security gaps.

Lead With Balance: How Today’s Leaders Are Investing and Optimizing

In our webinar, our technology, change management, and cybersecurity experts discuss how leaders can keep cost optimization in mind.