Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Credit to Author: Jim Flack| Date: Thu, 02 Jul 2020 16:00:59 +0000

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.

The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security.

Read more

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Credit to Author: Jim Flack| Date: Thu, 25 Jun 2020 16:00:18 +0000

This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. This is the seventh in a series.

The post Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting appeared first on Microsoft Security.

Read more

CISO Stressbusters: Post #2: 4 tips for getting the first 6 months right as a new CISO

Credit to Author: Jim Flack| Date: Tue, 23 Jun 2020 18:00:17 +0000

CISO Stressbusters: CISO guidance and support from around the world.

The post CISO Stressbusters: Post #2: 4 tips for getting the first 6 months right as a new CISO appeared first on Microsoft Security.

Read more

Operational resilience in a remote work world

Credit to Author: Jim Flack| Date: Mon, 18 May 2020 16:00:55 +0000

Cybersecurity provides the underpinning to operationally resiliency as more organizations adapt to enabling secure remote work options, whether in the short or long term.

The post Operational resilience in a remote work world appeared first on Microsoft Security.

Read more

Afternoon Cyber Tea: Building operational resilience in a digital world

Credit to Author: Todd VanderArk| Date: Mon, 13 Apr 2020 16:00:33 +0000

On Afternoon Cyber Tea with Ann Johnson, Ann and Ian Coldwell talk about how CISOs can prepare for a cyberattack, master the magic and complexity of containers, and encourage collaboration between engineering and security.

The post Afternoon Cyber Tea: Building operational resilience in a digital world appeared first on Microsoft Security.

Read more