New browser extensions for integrating Microsoft’s hardware-based isolation

Credit to Author: Eric Avena| Date: Thu, 23 May 2019 15:50:07 +0000

The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. We introduced the container technology in 2017. Since then, we have been evolving the technology and engaging with customers to understand how hardware-based isolation can best help…

The post New browser extensions for integrating Microsoft’s hardware-based isolation appeared first on Microsoft Security.

Read more

Step 9. Protect your OS: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 21 May 2019 16:00:43 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 9. Protect your OS,” you’ll learn how to configure Microsoft Defender Advanced Threat Protection to prevent, detect, investigate, and respond to advanced threats.

The post Step 9. Protect your OS: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments

Credit to Author: Elizabeth Wolk| Date: Thu, 16 May 2019 16:00:15 +0000

Read why Ovum believes Microsoft 365 and Azure can protect enterprises who use multiple cloud providers.

The post Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments appeared first on Microsoft Security.

Read more

Announcing the all new Attack Surface Analyzer 2.0

Credit to Author: Todd VanderArk| Date: Wed, 15 May 2019 16:00:18 +0000

Attack Surface Analyzer 2.0 can help you identify security risks introduced when installing software on Windows, Linux, or macOS by analyzing changes to the file system, registry, network ports, system certificates, and more.

The post Announcing the all new Attack Surface Analyzer 2.0 appeared first on Microsoft Security.

Read more

Decentralized identity and the path to digital privacy

Credit to Author: Todd VanderArk| Date: Wed, 15 May 2019 13:00:30 +0000

Security is the central challenge of the digital age. Our digital lives have moved into the cloud. People now use multiple devices to connect to multiple applications through many different networks. Just about everything is connected to the internet, where threats remain constant and evolving. In this distributed, heterogeneous environment, however, there’s still only one “you.” That’s why decentralized identity is the best path to security.

The post Decentralized identity and the path to digital privacy appeared first on Microsoft Security.

Read more

Executing on the vision of Microsoft Threat Protection

Credit to Author: Todd VanderArk| Date: Tue, 14 May 2019 16:00:48 +0000

Learn about how we’re already executing on the vision of Microsoft Threat Protection—the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.

The post Executing on the vision of Microsoft Threat Protection appeared first on Microsoft Security.

Read more

Detecting credential theft through memory access modelling with Microsoft Defender ATP

Credit to Author: Eric Avena| Date: Thu, 09 May 2019 17:29:45 +0000

Microsoft Defender ATP instruments memory-related function calls such as VirtualAlloc and VirtualProtect to catch in-memory attack techniques like reflective DLL loading. The same signals can also be used to generically detect malicious credential dumping activities performed by a wide range of different individual tools.

The post Detecting credential theft through memory access modelling with Microsoft Defender ATP appeared first on Microsoft Security.

Read more

Safeguard your most sensitive data with Microsoft 365

Credit to Author: Todd VanderArk| Date: Thu, 09 May 2019 16:00:03 +0000

Protect your most privileged data and comply with GDPR. Read our latest e-book, “Safeguard your most sensitive data,” to find out how.

The post Safeguard your most sensitive data with Microsoft 365 appeared first on Microsoft Security.

Read more

First American Financial Corp. Leaked Hundreds of Millions of Title Insurance Records

Credit to Author: BrianKrebs| Date: Fri, 24 May 2019 20:47:11 +0000

The Web site for Fortune 500 real estate title insurance giant First American Financial Corp. [NYSE:FAF] leaked hundreds of millions of documents related to mortgage deals going back to 2003, until notified this week by KrebsOnSecurity. The digitized records — including bank account numbers and statements, mortgage and tax records, Social Security numbers, wire transaction receipts, and drivers license images — were available without authentication to anyone with a Web browser.

Read more

Medical industry struggles with PACS data leaks

Credit to Author: Vasilios Hioureas| Date: Fri, 24 May 2019 18:05:21 +0000

PACS servers are often used to store and transmit patient data. But how is their security implemented? We take a look at case of how poor setup can easily lead to data leaks.

Categories:

Tags:

(Read more…)

The post Medical industry struggles with PACS data leaks appeared first on Malwarebytes Labs.

Read more

The Experience of a Launch: Galaxy VS

Credit to Author: Hector Martinez| Date: Fri, 24 May 2019 15:48:51 +0000

One of the most important experiences I’ve had in my life has been the opportunity to witness the launch of a rocket into space. In my case, I was present… Read more »

The post The Experience of a Launch: Galaxy VS appeared first on Schneider Electric Blog.

Read more