Security

MicrosoftSecurity

Step 4. Set conditional access policies: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Wed, 30 Jan 2019 17:00:12 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and corporate resources using conditional access policies, and how these policies can block legacy authentication methods and control access to SaaS apps.

The post Step 4. Set conditional access policies: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
SecurityTrendMicro

How Machine Learning can Expose and Illustrate Network Threats

Credit to Author: Trend Micro| Date: Wed, 30 Jan 2019 14:34:21 +0000

Although machine learning algorithms have been around for years, additional use cases are being discovered and applied all the time, particularly when it comes to network and data security. As years have passed, the skills and sophisticated approaches being utilized by hackers have risen in severity and frequency, and white hats as well as enterprise…

The post How Machine Learning can Expose and Illustrate Network Threats appeared first on .

Read More
MalwareBytesSecurity

Apple’s FaceTime privacy bug allowed possible spying

Credit to Author: Thomas Reed| Date: Tue, 29 Jan 2019 19:00:09 +0000

A new bug in Apple’s FaceTime app that allowed for possible spying has the Internet in an uproar. Do Apple users need to disable FaceTime immediately? Mac expert Thomas Reed swoops in as the voice of reason.

Categories:

Tags:

(Read more…)

The post Apple’s FaceTime privacy bug allowed possible spying appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Interview with a malware hunter: Jérôme Segura

Credit to Author: Pieter Arntz| Date: Tue, 29 Jan 2019 16:00:00 +0000

In our series called “Interview with a malware hunter,” we turn to Jerome Segura, Head of Threat Intelligence at Malwarebytes. In this Q&A session, we’ll take you behind the scenes to get to know one of our malware intelligence crew.

Categories:

Tags:

(Read more…)

The post Interview with a malware hunter: Jérôme Segura appeared first on Malwarebytes Labs.

Read More