Protecting your remote workforce from application-based attacks like consent phishing

Credit to Author: Jim Flack| Date: Wed, 08 Jul 2020 16:00:27 +0000

Learn how to protect your workforce from application-based attacks and the investments Microsoft is making to help foster a secure and trustworthy app ecosystem.

The post Protecting your remote workforce from application-based attacks like consent phishing appeared first on Microsoft Security.

Read more

Modernizing the security operations center to better secure a remote workforce

Credit to Author: Jim Flack| Date: Mon, 22 Jun 2020 16:00:10 +0000

The modern SOC will use machine learning to help humans protect organizations in a multi-cloud, IoT world.

The post Modernizing the security operations center to better secure a remote workforce appeared first on Microsoft Security.

Read more

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Credit to Author: Eric Avena| Date: Thu, 18 Jun 2020 16:00:03 +0000

In the first blog in the Inside Microsoft Threat Protection series, we will show how MTP provides unparalleled end-to-end visibility into the activities of nation-state level attacks like HOLMIUM.

The post Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint appeared first on Microsoft Security.

Read more

Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2

Credit to Author: Jim Flack| Date: Tue, 05 May 2020 01:00:36 +0000

This blog wraps up the day in the life of a SOC analyst on the investigation team with insights on remediating incidents, post-incident cleanup, and impact of COVID-19 on the SOC. This is the sixth blog post in the series.

The post Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2 appeared first on Microsoft Security.

Read more

Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation

Credit to Author: Jim Flack| Date: Fri, 01 May 2020 22:04:30 +0000

The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29.

The post Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation appeared first on Microsoft Security.

Read more

Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave

Credit to Author: Todd VanderArk| Date: Wed, 18 Mar 2020 16:00:23 +0000

I’m proud to announce that Microsoft is positioned as a Leader in The Forrester Wave™: Enterprise Detection and Response, Q1 2020.

The post Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave appeared first on Microsoft Security.

Read more

Microsoft Security—a Leader in 5 Gartner Magic Quadrants

Credit to Author: Todd VanderArk| Date: Tue, 03 Dec 2019 17:00:21 +0000

Gartner has named Microsoft Security a Leader in five Magic Quadrants, which demonstrates balanced progress and effort in all execution and vision categories.

The post Microsoft Security—a Leader in 5 Gartner Magic Quadrants appeared first on Microsoft Security.

Read more

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

Credit to Author: Todd VanderArk| Date: Thu, 14 Nov 2019 17:00:56 +0000

A series on DART’s tools, techniques, and procedures for investigating cybersecurity incidents at their customer organizations. Part 1 introduces the team and gives a brief overview of the tools that DART utilizes.

The post Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1 appeared first on Microsoft Security.

Read more