Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents

Credit to Author: Eric Avena| Date: Thu, 09 Jul 2020 16:00:27 +0000

The incidents view in Microsoft Threat Protection empowers SOC analysts by automatically fusing attack evidence and providing a consolidated view of an attack chain and affected assets, as well as a single-click remediation with easy-to-read analyst workflows.

The post Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents appeared first on Microsoft Security.

Read more

Introducing Kernel Data Protection, a new platform security technology for preventing data corruption

Credit to Author: Eric Avena| Date: Wed, 08 Jul 2020 17:30:05 +0000

Kernel Data Protection (KDP) is a set of APIs that provide the ability to mark some kernel memory as read-only, preventing attackers from ever modifying protected memory.

The post Introducing Kernel Data Protection, a new platform security technology for preventing data corruption appeared first on Microsoft Security.

Read more

Protecting your remote workforce from application-based attacks like consent phishing

Credit to Author: Jim Flack| Date: Wed, 08 Jul 2020 16:00:27 +0000

Learn how to protect your workforce from application-based attacks and the investments Microsoft is making to help foster a secure and trustworthy app ecosystem.

The post Protecting your remote workforce from application-based attacks like consent phishing appeared first on Microsoft Security.

Read more

New study shows customers save time, resources and improve security with Microsoft Cloud App Security

Credit to Author: Jim Flack| Date: Tue, 07 Jul 2020 13:00:26 +0000

The global pandemic has forever changed our workplaces and reshaped our cybersecurity priorities. While in recent months cloud apps have helped people around the globe stay productive and connected. They also pose an increased cybersecurity risk to businesses large and small, especially when you don’t know which cloud apps your employees may be using.  Now,…

The post New study shows customers save time, resources and improve security with Microsoft Cloud App Security appeared first on Microsoft Security.

Read more

The world is your authentication and identity oyster

Credit to Author: Jim Flack| Date: Thu, 02 Jul 2020 18:00:29 +0000

For decades we have been taught that passwords are some level of security that can be implemented to protect websites. We need to dispel this unfortunate notion.

The post The world is your authentication and identity oyster appeared first on Microsoft Security.

Read more

Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Credit to Author: Jim Flack| Date: Thu, 02 Jul 2020 16:00:59 +0000

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.

The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security.

Read more