AI, Identity And The Cybersecurity Risk
Attackers still log in. For years, credential theft through phishing has been one of the most persistent and damaging threats to modern organizations, not because it is sophisticated, but because it works.
Attackers still log in. For years, credential theft through phishing has been one of the most persistent and damaging threats to modern organizations, not because it is sophisticated, but because it works.
Microsoft just shipped the missing primitive for tenant governance: UTCM in Graph (beta)
We are proud to announce that we have been awarded Microsoft Security Partner of the Year FY 2025!
Fortytwo is growing, and we are strengthening the team with new expertise. We are pleased to welcome Julie Remen as our new Chief Marketing Officer (CMO).
While others still debate their cloud strategy, Fortytwo builds for the way work actually happens. For real: Fortytwo is already there: building, automating, and delivering technology entirely in the cloud.
Fortytwo is on a roll. Silje Føyen has been with us behind the scenes for some time, and now it’s official: she has become a permanent part of our team as our new marketing muscle.
A concise guide to understanding key cloud concepts and their business value.
Fortytwo is growing, and we are pleased to welcome James Wright to the team.
Entra SSE Part 1: When Access Becomes the Attack Vector
Fortytwo is growing again, and we are proud to welcome Caroline Woldbæk to the team.
A good glossary shouldn’t sound like a manual. It should read like a field guide — short definitions that make you actually understand what’s happening when someone says “Zero Trust” or “Conditional Access.”
Fortywo is growing, and Reidar Johan Boldevin, starting October 6th, brings over two decades of experience in technology, leadership, and global consulting.
Passwords have been the default for decades. They were simple to set up, easy to explain, and cheap to distribute.