
Our Blog
Welcome to the levacloud blog. You will find a selection of content focused around Microsoft 365, Zero Trust Security and more. We like to create content that we believe our customers and the community will find useful as they try and navigate the ever evolving threat landscape that we live in today.
Underneath our blog you will see links to other blogs that we have chosen to feature.

Reinventing VPN Security: Microsoft Defender for Identity vs. Azure AD Application Proxy
As the cybersecurity landscape continues to evolve, the need for robust, secure, and efficient VPN solutions has become more critical. Today, we delve into Microsoft’s

The Security Advantages of Transitioning from ADFS to Azure AD
As cyber threats continue to grow in sophistication, organizations must remain vigilant in adopting advanced security solutions. Azure Active Directory (Azure AD) offers a substantial

A Security Architect Reacts: Microsoft Licensing
A Security Architect Reacts vlog and podcast with Gareth Young, Founder and Chief Architect of Levacloud LLC. in this episode he gives guidance and demystifies

A Security Architect Reacts: A Clearer lens on Zero Trust Security strategy: Part 1
A Security Architect Reacts vlog and podcast with Gareth Young, Founder and Chief Architect of Levacloud LLC, reviewing the Microsoft Security Blog “A Clearer lens

Why Virtual Machines Should be Part of Your 5 Year Growth Plan
Virtual Machines Should be Part of Your 5 Year Growth PlaN Virtual Machines (VM): A virtual machine is a computer file, typically called an image, that

The FREE and EASY Way to Secure your Hybrid Cloud Environment
Hybrid cloud requires a new approach for security, with your infrastructure being spread out there is a need for increased visibility and control.

Business Leaders! 4 crucial facts to protect your organization’s data within Microsoft 365
Protect Your Data Within Microsoft 365 With many organizations performing rapid cloud migrations to meet remote work requirements, there is a growing concern within the cybersecurity community that organizations

How to Balance Productivity and Security in Microsoft 365 – A Crucial Read for Architects
In legacy security models, the primary objective was to protect corporate applications and data by creating a security perimeter that could only be traversed via a corporate device with a VPN. As consumer

5 Simple Must-Haves for Protecting Office 365 and Azure
Here are some simple, and easy to implement tips and tricks to help improve the security posture of your Office 365 and Microsoft Azure environments.
Featured blogs:
A small selection of blogs with quality content that we would like to share:
The Microsoft security blog is a great resource to stay up-to-date on both Microsoft Security and Compliance product update, as well as thought leadership on how to tack security and compliance challenges within your organization, as well as information about threat actors that Microsoft’s team of security researchers have discovered and developed mitigation techniques for.
Microsoft Detection and Response Team (DART) blog series is focused on the latest attack methods as well as cybersecurity best practices derived from our investigations and engagements, helping our customers respond to compromises and become cyber-resilient.
The CISA is a US govenrment agency responsible for Cybersecurity and Infrastructure, their blog is a great way to get a vendor neutral perspective on current events within the cybersecurity community that have significance at the national level.
If you have a blog, or an article, video or podcast that you would like us to feature then please reach out via email. If you are interested in collaborating on some content feel free to reach out also, we are open to new ideas especially if the content is going to benefit others.
ISC2 is the governing body for gold standard cybersecurity certifications such as the CISSP. This blog is a great way to stay up-to-date on current events, especially if you are studying for a cybersecurity certification