<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Ghost Academy]]></title><description><![CDATA[Our organisation provides IT & Cyber Security technical capability through education & expert-led, tailored uplift programs.]]></description><link>https://www.ghostacademy.io/knowledge</link><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 02:46:55 GMT</lastBuildDate><atom:link href="https://www.ghostacademy.io/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Building Resilience - Blocking Legacy Authentication]]></title><description><![CDATA[In history, we built resilience into our towns and villages by building walls around them or a Castle on a hill. This idea can be carried forward into our Entra ID Conditional Access. Blocking legacy authentication is one of the highest-impact controls you can implement in Entra ID. It removes a common attack path that bypasses MFA enforcement and weakens Conditional Access design. This control is potentially one of the most useful policies in Conditional Access but it's also one that is...]]></description><link>https://www.ghostacademy.io/post/building-resilience-blocking-legacy-authentication</link><guid isPermaLink="false">69a39f2c177696dbd354adcf</guid><pubDate>Mon, 16 Mar 2026 03:00:15 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ef90b5_df402425c7ab49c3913c213e1a78fe22~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Jason &apos;Gh0st&apos; Spectre</dc:creator></item><item><title><![CDATA[Building Resilience - A Practical Zero-Trust Baseline in Entra ID Conditional Access]]></title><description><![CDATA[Zero trust sounds great in a slide deck. In a real tenant, it usually comes down to a handful of decisions that either tighten things up properly or leave gaps you only discover later. I’ve seen environments with dozens of Conditional Access policies that nobody can confidently explain. I’ve also seen tenants with almost nothing enforced because “it might break something.” Neither approach is sustainable. A good baseline isn’t complicated.  It’s clear. It’s consistent. And it reflects how...]]></description><link>https://www.ghostacademy.io/post/building-resilience-a-practical-zero-trust-baseline-in-entra-id-conditional-access</link><guid isPermaLink="false">69a39c1532a596f2a27f6a9e</guid><pubDate>Mon, 09 Mar 2026 03:00:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/7555b8a2949a484397d89cf00ca13d14.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Jason &apos;Gh0st&apos; Spectre</dc:creator></item><item><title><![CDATA[Building Resilience - Mastering Entra ID through a Zero Trust Framework]]></title><description><![CDATA[Designing Entra ID Conditional Access without applying zero-trust principles is one of the most common security mistakes in modern cloud environments. Policies are often built around convenience, legacy network assumptions, or the belief that something “internal” is automatically safe. That model does not hold up anymore. If you are responsible for Conditional Access in Entra ID, zero trust is not a marketing concept. It is a practical design approach that removes weak assumptions from your...]]></description><link>https://www.ghostacademy.io/post/building-resilience-mastering-entra-id-through-a-zero-trust-framework</link><guid isPermaLink="false">69a39c64177696dbd354a9be</guid><pubDate>Mon, 02 Mar 2026 03:54:08 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ef90b5_695f6819ae73436eb251c28da09278de~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Jason &apos;Gh0st&apos; Spectre</dc:creator></item></channel></rss>