Mobile threat defense and intelligence are a core part of cyber defense

Credit to Author: Todd VanderArk| Date: Thu, 19 Dec 2019 17:00:32 +0000

To safeguard company assets, organizations need to augment their global cyber defense strategy with mobile threat intelligence.

The post Mobile threat defense and intelligence are a core part of cyber defense appeared first on Microsoft Security.

Read more

GALLIUM: Targeting global telecom

Credit to Author: Todd VanderArk| Date: Thu, 12 Dec 2019 17:00:10 +0000

Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers.

The post GALLIUM: Targeting global telecom appeared first on Microsoft Security.

Read more

Improve cyber supply chain risk management with Microsoft Azure

Credit to Author: Todd VanderArk| Date: Mon, 09 Dec 2019 17:00:03 +0000

To keep government agencies secure in the cloud, we must keep pace and stay ahead of cyber attackers by defending the cyber supply chain with Microsoft Azure.

The post Improve cyber supply chain risk management with Microsoft Azure appeared first on Microsoft Security.

Read more

Spear phishing campaigns—they’re sharper than you think

Credit to Author: Todd VanderArk| Date: Mon, 02 Dec 2019 17:00:15 +0000

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.

The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security.

Read more

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

Credit to Author: Todd VanderArk| Date: Thu, 14 Nov 2019 17:00:56 +0000

A series on DART’s tools, techniques, and procedures for investigating cybersecurity incidents at their customer organizations. Part 1 introduces the team and gives a brief overview of the tools that DART utilizes.

The post Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1 appeared first on Microsoft Security.

Read more

Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant

Credit to Author: Todd VanderArk| Date: Tue, 29 Oct 2019 14:00:13 +0000

In Gartner’s third annual Magic Quadrant for Cloud Access Security Brokers (CASB), Microsoft was named a Leader based on its completeness of vision and ability to execute in the CASB market.

The post Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant appeared first on Microsoft Security.

Read more

Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise

Credit to Author: Eric Avena| Date: Mon, 28 Oct 2019 15:00:10 +0000

Experts on demand is now generally available and gives customers direct access to real-life Microsoft threat analysts to help with their security investigations.

The post Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise appeared first on Microsoft Security.

Read more

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Credit to Author: Eric Avena| Date: Tue, 08 Oct 2019 15:00:11 +0000

Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.

The post In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks appeared first on Microsoft Security.

Read more