Consulting with a Conscience™

A cruciallogics blog

A 3D illustration of a smartphone with a fingerprint icon, password dots, and a green shield checkmark symbolizing security and authentication. A padlock and key lie beside the phone, representing data protection and access control.
March 5, 2025
Learn how to enforce Privileged Identity Management (PIM) using Microsoft Entra to control...
Illustration of the Microsoft SharePoint logo in green with stylized connected windows and document icons surrounding it, representing collaboration and document management features. The word SharePoint appears below the graphic in bold green text.
February 25, 2025
Discover how SharePoint automates business processes, reduces human error, and streamlines workflows to...
A digital illustration of a human brain integrated with glowing circuit lines, symbolizing artificial intelligence, machine learning, and the fusion of technology with human cognition.
February 17, 2025
Expert guide on implementing secure AI, managing risks, understanding AI's capabilities and limitations,...
A 3D digital illustration of interconnected devices, including a smartphone and computer screen, displaying padlock and shield icons in blue tones, symbolizing cybersecurity, data encryption, and secure digital communication.
February 10, 2025
Discover how Zero Trust Network Access (ZTNA) enhances security within the Microsoft 365...
3D illustration of the Microsoft SharePoint logo on a green background; featuring the SharePoint icon and a stylized graphic of a digital workspace representing collaboration and document management tools.
February 3, 2025
Learn how to leverage SharePoint for effective project management. This blog explores various...

Get cybersecurity tips on Microsoft technologies delivered straight to your inbox.

Subscribe to Our Newsletter

Secure your business using your native microsoft technologies

This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy

Professional man wearing a gray suit, white dress shirt, and black patterned tie; posing confidently in a modern office environment with glass walls and pendant lighting in the background.

Amol Joshi

CHIEF EXECUTIVE OFFICER

Amol is a senior security executive with over 20 years of experience in leading and executing complex IT transformations and security programs. He’s a firm believer in achieving security through standardization, avoiding complexity, and that security is achieved using native, easy-to-use technologies.

Amol approaches business challenges in a detail-oriented way and demonstrates quantifiable results throughout highly technical and complex engagements. Creative, innovative, and enthusiastic, Amol uses the Consulting with a Conscience™ approach to advise clients about IT solutions.

Amol has a BSc. in Computer Science, is a certified Project Manager by PMI (PMP), and is a Certified Information Systems Security Professional (CISSP).