Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

Credit to Author: Eric Avena| Date: Thu, 23 Jul 2020 16:00:53 +0000

Learn how we’re using deep learning to build a powerful, high-precision classification model for long sequences of wide-ranging signals occurring at different times.

The post Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection appeared first on Microsoft Security.

Read more

Microsoft Intelligent Security Association expands to include managed security service providers

Credit to Author: Jim Flack| Date: Tue, 14 Jul 2020 14:00:32 +0000

The Microsoft Intelligent Security Association expands to include Security MSSPs, through a pilot program that launched July 2020.

The post Microsoft Intelligent Security Association expands to include managed security service providers appeared first on Microsoft Security.

Read more

CISO Stressbusters: Post #2: 4 tips for getting the first 6 months right as a new CISO

Credit to Author: Jim Flack| Date: Tue, 23 Jun 2020 18:00:17 +0000

CISO Stressbusters: CISO guidance and support from around the world.

The post CISO Stressbusters: Post #2: 4 tips for getting the first 6 months right as a new CISO appeared first on Microsoft Security.

Read more

Modernizing the security operations center to better secure a remote workforce

Credit to Author: Jim Flack| Date: Mon, 22 Jun 2020 16:00:10 +0000

The modern SOC will use machine learning to help humans protect organizations in a multi-cloud, IoT world.

The post Modernizing the security operations center to better secure a remote workforce appeared first on Microsoft Security.

Read more

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Credit to Author: Eric Avena| Date: Thu, 18 Jun 2020 16:00:03 +0000

In the first blog in the Inside Microsoft Threat Protection series, we will show how MTP provides unparalleled end-to-end visibility into the activities of nation-state level attacks like HOLMIUM.

The post Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint appeared first on Microsoft Security.

Read more

Open-sourcing new COVID-19 threat intelligence

Credit to Author: Jim Flack| Date: Thu, 14 May 2020 18:00:44 +0000

While the world faces the common threat of COVID-19, defenders are working overtime to protect users all over the globe from cyber-criminals using COVID-19 as a lure to mount attacks.

The post Open-sourcing new COVID-19 threat intelligence appeared first on Microsoft Security.

Read more

How to gain 24/7 detection and response coverage with Microsoft Defender ATP

Credit to Author: Jim Flack| Date: Wed, 06 May 2020 19:00:12 +0000

Security incidents don’t happen exclusively during business hours: attackers often wait until the late hours of the night to breach an environment.

The post How to gain 24/7 detection and response coverage with Microsoft Defender ATP appeared first on Microsoft Security.

Read more

Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry

Credit to Author: Jim Flack| Date: Wed, 22 Apr 2020 19:00:52 +0000

By working with governments, trade organizations, and suppliers, the utility industry can improve security across the supply chain.

The post Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry appeared first on Microsoft Security.

Read more