Go passwordless to strengthen security and reduce costs

Credit to Author: Todd VanderArk| Date: Thu, 12 Dec 2019 00:00:56 +0000

Joy Chik, Microsoft CVP, Identity, explains how passwordless works and provides steps to begin preparing your organization to eliminate passwords.

The post Go passwordless to strengthen security and reduce costs appeared first on Microsoft Security.

Read more

Spear phishing campaigns—they’re sharper than you think

Credit to Author: Todd VanderArk| Date: Mon, 02 Dec 2019 17:00:15 +0000

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.

The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security.

Read more

Rethinking cyber learning—consider gamification

Credit to Author: Todd VanderArk| Date: Mon, 25 Nov 2019 17:00:55 +0000

Gamified cybersecurity solutions offer immense promise by giving users practical, hands-on opportunities to learn by doing. Microsoft and Circadence are partnering to deliver Azure-hosted cyber range learning solutions for beginners up to advanced SecOps pros. Gamification is an increasingly important way for enterprises to attract tomorrow’s cyber pro talent and create tailored learning and more defined career paths and progression.

The post Rethinking cyber learning—consider gamification appeared first on Microsoft Security.

Read more

Zero Trust strategy—what good looks like

Credit to Author: Todd VanderArk| Date: Mon, 11 Nov 2019 17:00:11 +0000

Zero Trust is a model that will ultimately be infused throughout your enterprise and should inform virtually all access decisions and interactions between systems.

The post Zero Trust strategy—what good looks like appeared first on Microsoft Security.

Read more

Thinking about the balance between compliance and security

Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 17:00:55 +0000

Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.

The post Thinking about the balance between compliance and security appeared first on Microsoft Security.

Read more

How to balance compliance and security with limited resources

Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 17:00:55 +0000

Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.

The post How to balance compliance and security with limited resources appeared first on Microsoft Security.

Read more

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Credit to Author: Todd VanderArk| Date: Wed, 23 Oct 2019 19:00:33 +0000

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.

The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security.

Read more