Success in security: reining in entropy

Credit to Author: Jim Flack| Date: Wed, 20 May 2020 18:00:12 +0000

Your network is unique. It’s a living, breathing system evolving over time. The applications and users performing these actions are all unique parts of the system, adding degrees of disorder and entropy to your operating environment.

The post Success in security: reining in entropy appeared first on Microsoft Security.

Read more

Mitigating vulnerabilities in endpoint network stacks

Credit to Author: Jim Flack| Date: Mon, 04 May 2020 16:00:25 +0000

Learn how the Microsoft Security Assurance and Vulnerability Research team secures critical products.

The post Mitigating vulnerabilities in endpoint network stacks appeared first on Microsoft Security.

Read more

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Credit to Author: Jim Flack| Date: Thu, 30 Apr 2020 16:00:29 +0000

Microsoft is providing a series of deployment guides for customers who have engaged in a Zero Trust security strategy to configure Azure Active Directory (Azure AD) capabilities.

The post Zero Trust Deployment Guide for Microsoft Azure Active Directory appeared first on Microsoft Security.

Read more

Protecting your organization against password spray attacks

Credit to Author: Jim Flack| Date: Thu, 23 Apr 2020 16:00:22 +0000

If your users sign in with guessable passwords, you may be at risk of a password spray attack.

The post Protecting your organization against password spray attacks appeared first on Microsoft Security.

Read more

Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry

Credit to Author: Jim Flack| Date: Wed, 22 Apr 2020 19:00:52 +0000

By working with governments, trade organizations, and suppliers, the utility industry can improve security across the supply chain.

The post Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry appeared first on Microsoft Security.

Read more

Microsoft and Zscaler help organizations implement the Zero Trust model

Credit to Author: Todd VanderArk| Date: Thu, 23 Jan 2020 17:00:27 +0000

Microsoft has built deep integrations with Zscaler—a cloud-native, multitenant security platform—to help organizations with their Zero Trust journey.

The post Microsoft and Zscaler help organizations implement the Zero Trust model appeared first on Microsoft Security.

Read more

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Credit to Author: Todd VanderArk| Date: Wed, 23 Oct 2019 19:00:33 +0000

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.

The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security.

Read more

Protect against BlueKeep

Credit to Author: Todd VanderArk| Date: Thu, 08 Aug 2019 16:00:57 +0000

DART offers steps you can take to protect your network from BlueKeep, the “wormable” vulnerability that can create a large-scale outbreak due to its ability to replicate and propagate.

The post Protect against BlueKeep appeared first on Microsoft Security.

Read more