Barracuda and Microsoft: Securing applications in public cloud

Credit to Author: Jim Flack| Date: Thu, 18 Jun 2020 18:00:00 +0000

The biggest blockers to public cloud adoption are sophisticated hackers, open vulnerabilities in applications, DDOs attacks and advanced bots/botnets. Learn how MISA Partner Barracuda works with Microsoft to protect cloud applications.

The post Barracuda and Microsoft: Securing applications in public cloud appeared first on Microsoft Security.

Read more

Protecting your organization against password spray attacks

Credit to Author: Jim Flack| Date: Thu, 23 Apr 2020 16:00:22 +0000

If your users sign in with guessable passwords, you may be at risk of a password spray attack.

The post Protecting your organization against password spray attacks appeared first on Microsoft Security.

Read more

Turning collaboration and customer engagement up with a strong identity approach

Credit to Author: Todd VanderArk| Date: Mon, 06 Apr 2020 16:00:03 +0000

Balancing friction-less collaboration and highly targeted engagement with privacy and security is not easy, but you don’t have to go it alone.

The post Turning collaboration and customer engagement up with a strong identity approach appeared first on Microsoft Security.

Read more

Making it easier for your remote workforce to securely access all the apps they need, from anywhere

Credit to Author: Todd VanderArk| Date: Tue, 31 Mar 2020 16:00:03 +0000

Ensure your remote workforce has secure access to all the apps they need: SaaS, cloud-hosted, on-premises, and legacy.

The post Making it easier for your remote workforce to securely access all the apps they need, from anywhere appeared first on Microsoft Security.

Read more

Defending the power grid against supply chain attacks—Part 2: Securing hardware and software

Credit to Author: Todd VanderArk| Date: Mon, 23 Mar 2020 16:00:19 +0000

The hardware and software companies who supply utilities must implement better security of their build and update environment to reduce the risk of an attack on critical infrastructure.

The post Defending the power grid against supply chain attacks—Part 2: Securing hardware and software appeared first on Microsoft Security.

Read more

Empower Firstline Workers with Azure AD and YubiKey passwordless authentication

Credit to Author: Todd VanderArk| Date: Thu, 12 Mar 2020 16:00:37 +0000

The integration of FIDO2-based YubiKeys and Azure Active Directory (Azure AD) is a game changer.

The post Empower Firstline Workers with Azure AD and YubiKey passwordless authentication appeared first on Microsoft Security.

Read more

Microsoft identity acronyms—what do they mean and how do they relate to each other?

Credit to Author: Todd VanderArk| Date: Mon, 02 Mar 2020 17:00:54 +0000

This is the first in a blog series to help lessen confusion around identity by sharing with you some of the terms used at Microsoft.

The post Microsoft identity acronyms—what do they mean and how do they relate to each other? appeared first on Microsoft Security.

Read more

Harnessing the power of identity management (IDaaS) in the cloud

Credit to Author: Malwarebytes Labs| Date: Tue, 18 Feb 2020 17:25:42 +0000

With security, compliance, and customer engagement driving organizations to the cloud, it’s no wonder IDaaS has become the standard in identity management. Learn about the benefits and concerns of IDaaS for organizations of all sizes.

Categories:

Tags:

(Read more…)

The post Harnessing the power of identity management (IDaaS) in the cloud appeared first on Malwarebytes Labs.

Read more