Entra SSE Part 2
Entra SSE Part 2: Building the Zero Trust Defense That Stopped the Breach
Entra SSE Part 2: Building the Zero Trust Defense That Stopped the Breach
A concise guide to understanding key cloud concepts and their business value.
Fortytwo is growing, and we are pleased to welcome James Wright to the team.
Entra SSE Part 1: When Access Becomes the Attack Vector
I’m writing this on my way home from a couple of exciting days in Fortytwo’s Oslo office.
Fortytwo is growing again, and we are proud to welcome Caroline Woldbæk to the team.
Security is no longer about defending borders. It’s about defending trust.
A good glossary shouldn’t sound like a manual. It should read like a field guide — short definitions that make you actually understand what’s happening when someone says “Zero Trust” or “Conditional Access.”
Compliance isn’t paperwork — it’s proof. GDPR, ISO 27001, and SOC 2 all start with one question: who has access, and how do you know?
Fortytwo continues to grow, and we are excited to welcome our new colleague, Bendik Berntsen.
Fortywo is growing, and Reidar Johan Boldevin, starting October 6th, brings over two decades of experience in technology, leadership, and global consulting.
Passwords have been the default for decades. They were simple to set up, easy to explain, and cheap to distribute.
Fortytwo is growing, and our latest addition is Harri Jaakkonen, joining us to lead the way in Finland and marking a new chapter of expansion for our company.
If Part 1 answered “what” and “why,” this post answers “where” and “how.” Below are practical use cases you can deploy now, plus a quick-start delivery plan to take Verified ID from idea to production—fast.