Senteon Blog

Security Configuration Hardening

3 min read

Hardening Microsoft Edge and Winning the Security Battle One Setting at a Time

Microsoft Edge—sure, it’s sleek and fast, but is it as secure as it could be? The answer may surprise you. During the...

READ MORE

2 min read

Proactively Hardening Microsoft Edge Communication Risks You Might Not Know Exist

It’s easy to assume that your browser is secure, especially with all the built-in protections modern browsers offer....

READ MORE

2 min read

Background Activities in Microsoft Edge The Overlooked Settings that Can Strengthen Security

Most of us close our browsers and assume that’s the end of their activity. But for businesses prioritizing security,...

READ MORE

2 min read

The Myth of Zero Trust Why Trust is the Greatest Vulnerability in Cybersecurity

Trust is a Weakness in the Modern IT Landscape In a world where cyber threats are evolving daily, the concept of trust...

READ MORE

3 min read

Building a Stronger Microsoft Edge Defense

In the latest episode of the Senteon webinar series, cybersecurity expert Henry Timm from Phantom Technology Solutions...

READ MORE

2 min read

Isolating Threats in Microsoft Edge with Security Best Practices

When it comes to browser security, isolation is your best friend. In this week’s continuation of our CIS Benchmarks...

READ MORE

2 min read

Reinforcing Microsoft Edge with SmartScreen and Password Management

As we reach the final part of our CIS Benchmarks blog series, we delve into one of the most important aspects of...

READ MORE

2 min read

CIS Benchmarks and the Secret to Browser Security Hardening

When it comes to safeguarding browsers like Microsoft Edge, secure configurations are just the beginning. In the second...

READ MORE

2 min read

How Extensions Could Be Your Biggest Security Risk

When was the last time you looked at the extensions running on your browser? It’s easy to forget about them, especially...

READ MORE