Best practices for defending Azure Virtual Machines

Credit to Author: Teri Seals-Dormer| Date: Wed, 07 Oct 2020 16:00:20 +0000

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the cloud security shared responsibility model where customer tenants are responsible for security. Security is a…

The post Best practices for defending Azure Virtual Machines appeared first on Microsoft Security.

Read more

Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise

Credit to Author: Jim Flack| Date: Tue, 29 Sep 2020 16:00:51 +0000

A new report from Microsoft shows it is clear that threat actors have rapidly increased in sophistication over the past year, using techniques that make them harder to identify.

The post Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise appeared first on Microsoft Security.

Read more

New data from Microsoft shows how the pandemic is accelerating the digital transformation of cyber-security

Credit to Author: Jim Flack| Date: Wed, 19 Aug 2020 16:00:11 +0000

A Microsoft survey of security leaders during the pandemic highlight phishing threats, increased budgets & hiring, and investment in the cloud moving forward.

The post New data from Microsoft shows how the pandemic is accelerating the digital transformation of cyber-security appeared first on Microsoft Security.

Read more

Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World (Part 1)

Credit to Author: Trend Micro| Date: Tue, 11 Aug 2020 12:50:08 +0000

Welcome to the new normal. We’re all now living in a post-COVID-19 world characterized by uncertainty, mass home working and remote learning. The lines demarcating normal life have shifted abruptly – perhaps never to return. That’s not the worst that can happen, as we all know, but it does mean we all need to get…

The post Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World (Part 1) appeared first on .

Read more

Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World

Credit to Author: Trend Micro| Date: Tue, 11 Aug 2020 12:50:08 +0000

Welcome to the new normal. We’re all now living in a post-COVID-19 world characterized by uncertainty, mass home working and remote learning. The lines demarcating normal life have shifted abruptly – perhaps never to return. That’s not the worst that can happen, as we all know, but it does mean we all need to get…

The post Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World appeared first on .

Read more

Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World (part 2)

Credit to Author: Trend Micro| Date: Tue, 11 Aug 2020 12:45:47 +0000

The past few months have seen radical changes to our work and home life under the Coronavirus threat, upending norms and confining millions of American families within just four walls. In this context, it’s not surprising that more of us are spending an increasing portion of our lives online. But this brings with it some…

The post Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World (part 2) appeared first on .

Read more

Protecting your remote workforce from application-based attacks like consent phishing

Credit to Author: Jim Flack| Date: Wed, 08 Jul 2020 16:00:27 +0000

Learn how to protect your workforce from application-based attacks and the investments Microsoft is making to help foster a secure and trustworthy app ecosystem.

The post Protecting your remote workforce from application-based attacks like consent phishing appeared first on Microsoft Security.

Read more

Success in security: reining in entropy

Credit to Author: Jim Flack| Date: Wed, 20 May 2020 18:00:12 +0000

Your network is unique. It’s a living, breathing system evolving over time. The applications and users performing these actions are all unique parts of the system, adding degrees of disorder and entropy to your operating environment.

The post Success in security: reining in entropy appeared first on Microsoft Security.

Read more