Driving data security is a shared responsibility, here’s how you can protect yourself

Credit to Author: Jenny Erie| Date: Tue, 19 Jun 2018 16:00:05 +0000

You’re driving a long, dark road on a rainy night. If you’re driving 20 miles over the speed limit and you don’t step on the brakes when the car in front of you comes to a sudden stop, is it your fault or your car manufacturers fault if you rear-end the car that is in

Read more

Read more

New FastTrack benefit: Deployment support for Co-management on Windows 10 devices

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 18 Jun 2018 16:00:09 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Getting the most value out of your security deployment. We

Read more

Read more

Building Zero Trust networks with Microsoft 365

Credit to Author: Windows Defender ATP| Date: Thu, 14 Jun 2018 15:00:35 +0000

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional

Read more

Read more

Updating your cybersecurity strategy to enable and accelerate digital transformation

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 12 Jun 2018 19:00:35 +0000

This post is authored by Cyril Voisin, Cheif Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done. For example, it puts more control into the hands of employees, who now demand anytime, anywhere connectivity to the solutions and data they

Read more

Read more

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read more

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

Credit to Author: Jenny Erie| Date: Wed, 06 Jun 2018 16:00:31 +0000

The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it. How to use it We have seen this document used for

Read more

Read more

Virtualization-based security (VBS) memory enclaves: Data protection through isolation

Credit to Author: Windows Defender ATP| Date: Tue, 05 Jun 2018 16:00:15 +0000

The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote code execution capability, resulting in widescale global outbreaks. Windows 10 remained resilient to these attacks,

Read more

Read more

Getting the most value out of your security deployment

Credit to Author: Microsoft Secure Blog Staff| Date: Thu, 31 May 2018 16:00:38 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Now that you have a plan, its time to start

Read more

Read more

From the ground up to the cloud: Microsoft’s Intelligent Security supporting CISOs’ cloud transformation

Credit to Author: Jenny Erie| Date: Wed, 30 May 2018 19:00:57 +0000

Its no secret that Microsoft has embraced the cloud in a big wayfrom enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to securityintegrating workforce and cloud security in ways that make them much easier for enterprise IT

Read more

Read more

Adding transparency and context into industry AV test results

Credit to Author: Windows Defender ATP| Date: Thu, 24 May 2018 19:03:41 +0000

  Corporate Vice President Brad Anderson recently shared his insights on how Windows Defender Advanced Threat Protection (Windows Defender ATP) evolved to achieve important quality milestones. Our Windows Defender ATP team is committed to delivering industry-leading protection, customer choice, and transparency on the quality of our solutions. In the continued spirit of these principles, we

Read more

Read more

Want better apps? You need a (agile security) hero!

Credit to Author: Windows Defender ATP| Date: Thu, 24 May 2018 15:00:51 +0000

If weve learned anything from the rise of Marvel Cinematic Universe, its that good things tend to happen when heroes intervene. For securing new applications, this metaphor is a useful one because security isnt always top-of-mind for scrum teams, nor is it always conducive to meeting aggressive deadlines. But in the world of software security

Read more

Read more