Empowering your remote workforce with end-user security awareness

Credit to Author: Todd VanderArk| Date: Wed, 13 May 2020 15:00:04 +0000

To help customers deploy quick and effective security training to their remote workforce, we are announcing the availability of the Microsoft Cybersecurity Awareness Kit.

The post Empowering your remote workforce with end-user security awareness appeared first on Microsoft Security.

Read more

Managing risk in today’s IoT landscape: not a one-and-done

Credit to Author: Jim Flack| Date: Tue, 28 Apr 2020 16:00:29 +0000

Connectivity empowers organizations to unlock the full potential of IoT—but it also introduces new cybersecurity attack vectors. What does it take to manage those risks?

The post Managing risk in today’s IoT landscape: not a one-and-done appeared first on Microsoft Security.

Read more

Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry

Credit to Author: Jim Flack| Date: Wed, 22 Apr 2020 19:00:52 +0000

By working with governments, trade organizations, and suppliers, the utility industry can improve security across the supply chain.

The post Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry appeared first on Microsoft Security.

Read more

MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of advanced threats

Credit to Author: Jim Flack| Date: Tue, 21 Apr 2020 21:10:41 +0000

During the MITRE ATT&CK evaluation, Microsoft Threat Protection delivered on providing the deepest optics, near real time detection, and a complete view of the attack story.

The post MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of advanced threats appeared first on Microsoft Security.

Read more

Defending the power grid against supply chain attacks—Part 2: Securing hardware and software

Credit to Author: Todd VanderArk| Date: Mon, 23 Mar 2020 16:00:19 +0000

The hardware and software companies who supply utilities must implement better security of their build and update environment to reduce the risk of an attack on critical infrastructure.

The post Defending the power grid against supply chain attacks—Part 2: Securing hardware and software appeared first on Microsoft Security.

Read more

Changing the Monolith—Part 3: What’s your process?

Credit to Author: Todd VanderArk| Date: Thu, 30 Jan 2020 17:00:28 +0000

Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the Monolith—Part 3: What’s your process? appeared first on Microsoft Security.

Read more