cybersecurity

MicrosoftSecurity

Virtualization-based security (VBS) memory enclaves: Data protection through isolation

Credit to Author: Windows Defender ATP| Date: Tue, 05 Jun 2018 16:00:15 +0000

The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote code execution capability, resulting in widescale global outbreaks. Windows 10 remained resilient to these attacks,

Read more

Read More
MicrosoftSecurity

Adding transparency and context into industry AV test results

Credit to Author: Windows Defender ATP| Date: Thu, 24 May 2018 19:03:41 +0000

  Corporate Vice President Brad Anderson recently shared his insights on how Windows Defender Advanced Threat Protection (Windows Defender ATP) evolved to achieve important quality milestones. Our Windows Defender ATP team is committed to delivering industry-leading protection, customer choice, and transparency on the quality of our solutions. In the continued spirit of these principles, we

Read more

Read More
MicrosoftSecurity

Want better apps? You need a (agile security) hero!

Credit to Author: Windows Defender ATP| Date: Thu, 24 May 2018 15:00:51 +0000

If weve learned anything from the rise of Marvel Cinematic Universe, its that good things tend to happen when heroes intervene. For securing new applications, this metaphor is a useful one because security isnt always top-of-mind for scrum teams, nor is it always conducive to meeting aggressive deadlines. But in the world of software security

Read more

Read More
MicrosoftSecurity

Partnerships power the future of better security

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 22 May 2018 16:00:36 +0000

This post is authored by Jeremy Dallman, Principal Program Manager.   Our goal in building the Microsoft Graph Security API is to enable customers to share insights and take action across security solutions to improve protection and speed response. By creating a connected security ecosystem, Microsoft and partners can enable developers to simplify integration and

Read more

Read More
ScadaICSSchneider

Digital Transformation Fueling an Accelerated Shift in Technology Budgets from IT to LOB

Credit to Author: Abby Gabriel| Date: Fri, 18 May 2018 16:15:00 +0000

According to a recent IDC research report, technology spending is shifting from Information Technology (IT) organizations to the line of business (LOB). In fact, IDC is forecasting that LOB technology… Read more »

The post Digital Transformation Fueling an Accelerated Shift in Technology Budgets from IT to LOB appeared first on Schneider Electric Blog.

Read More