CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review

The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review

by CPI Staff | Apr 22, 2026 | Azure, Azure Security, Blog, Cybersecurity, Software Supply Chain Security

In this blog post, The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review, we look at why platforms like Vercel, Netlify, Cloudflare Pages, and Railway can no longer sit quietly outside the governance perimeter of an...
List Classic Azure Administrators Using PowerShell and Azure REST API

List Classic Azure Administrators Using PowerShell and Azure REST API

by CPI Staff | Jul 11, 2024 | Azure, Azure PowerShell, Azure Security, Blog

This Microsoft Azure article will show how to list classic Azure Administrators using PowerShell and Azure REST API. As an IT consultancy company that helps companies safeguard their Azure tenant, we perform many tenant assessments. As part of our identity and access...

Recent Posts

  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune