Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant

Credit to Author: Eric Avena| Date: Fri, 23 Aug 2019 16:00:40 +0000

Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms positioned highest in execution

The post Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant appeared first on Microsoft Security.

Read more

How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge

Credit to Author: Elizabeth Wolk| Date: Tue, 13 Aug 2019 16:00:38 +0000

Why is asset management—a problem that has persisted for decades—still an issue in 2019? Axonius is integrating with Microsoft to understand and solve this problem.

The post How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge appeared first on Microsoft Security.

Read more

From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Credit to Author: Eric Avena| Date: Thu, 08 Aug 2019 16:30:12 +0000

Machine learning and natural language processing can automate the processing of unstructured text for insightful, actionable threat intelligence.

The post From unstructured data to actionable intelligence: Using machine learning for threat intelligence appeared first on Microsoft Security.

Read more

Protect against BlueKeep

Credit to Author: Todd VanderArk| Date: Thu, 08 Aug 2019 16:00:57 +0000

DART offers steps you can take to protect your network from BlueKeep, the “wormable” vulnerability that can create a large-scale outbreak due to its ability to replicate and propagate.

The post Protect against BlueKeep appeared first on Microsoft Security.

Read more

A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

Credit to Author: Eric Avena| Date: Wed, 07 Aug 2019 23:50:25 +0000

Through a cross-company, cross-continent collaboration, we discovered a vulnerability, secured customers, and developed fix, all while learning important lessons that we can share with the industry.

The post A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response appeared first on Microsoft Security.

Read more

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Credit to Author: Eric Avena| Date: Wed, 31 Jul 2019 16:30:35 +0000

The deep integration of Windows Defender Antivirus with hardware-based isolation capabilities allows the detection of artifacts of attacks that tamper with kernel-mode agents at the hypervisor level.

The post How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection appeared first on Microsoft Security.

Read more

CISO series: Better cybersecurity requires a diverse and inclusive approach to AI and machine learning

Credit to Author: Todd VanderArk| Date: Wed, 31 Jul 2019 16:00:51 +0000

A collaborative, inclusive approach to creating AI and machine learning models can help increase your resilience to cyberattacks.

The post CISO series: Better cybersecurity requires a diverse and inclusive approach to AI and machine learning appeared first on Microsoft Security.

Read more

Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack

Credit to Author: Eric Avena| Date: Mon, 08 Jul 2019 16:00:51 +0000

Advanced technologies in Microsoft Defender ATP’s Antivirus exposed and defeated a widespread fileless campaign that completely “lived off the land” throughout a complex attack chain that run the info-stealing backdoor Astaroth directly in memory

The post Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack appeared first on Microsoft Security.

Read more

Council of EU Law Enforcement Protocol improves cross-border cooperation

Credit to Author: Todd VanderArk| Date: Tue, 30 Jul 2019 16:00:00 +0000

The new EU Law Enforcement Emergency Response Protocol addresses the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries.

The post Council of EU Law Enforcement Protocol improves cross-border cooperation appeared first on Microsoft Security.

Read more

The evolution of Microsoft Threat Protection—July update

Credit to Author: Todd VanderArk| Date: Mon, 29 Jul 2019 16:00:50 +0000

Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.

The post The evolution of Microsoft Threat Protection—July update appeared first on Microsoft Security.

Read more