Addressing cybersecurity risk in industrial IoT and OT

Credit to Author: Teri Seals-Dormer| Date: Wed, 21 Oct 2020 22:00:35 +0000

As the industrial Internet of Things (IIoT) and operational technology (OT) continue to evolve and grow, so too, do the responsibilities of the Chief Information Security Officer (CISO). The CISO now needs to mitigate risks from cloud-connected machinery, warehouse systems, and smart devices scattered among hundreds of workstations. Managing those security risks includes the need…

The post Addressing cybersecurity risk in industrial IoT and OT appeared first on Microsoft Security.

Read more

CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats

Credit to Author: Teri Seals-Dormer| Date: Tue, 20 Oct 2020 16:00:50 +0000

This year, we have seen five significant security paradigm shifts in our industry. This includes the acknowledgment that the greater the diversity of our data sets, the better the AI and machine learning outcomes. This diversity gives us an advantage over our cyber adversaries and improves our threat intelligence. It allows us to respond swiftly…

The post CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats appeared first on Microsoft Security.

Read more

Why we invite security researchers to hack Azure Sphere

Credit to Author: Teri Seals-Dormer| Date: Tue, 06 Oct 2020 16:00:04 +0000

Fighting the security battle so our customers don’t have to IoT devices are becoming more prevalent in almost every aspect of our lives—we will rely on them in our homes, our businesses, as well as our infrastructure. In February, Microsoft announced the general availability of Azure Sphere, an integrated security solution for IoT devices and…

The post Why we invite security researchers to hack Azure Sphere appeared first on Microsoft Security.

Read more

Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise

Credit to Author: Jim Flack| Date: Tue, 29 Sep 2020 16:00:51 +0000

A new report from Microsoft shows it is clear that threat actors have rapidly increased in sophistication over the past year, using techniques that make them harder to identify.

The post Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise appeared first on Microsoft Security.

Read more

Microsoft Security—detecting empires in the cloud

Credit to Author: Jim Flack| Date: Thu, 24 Sep 2020 19:00:38 +0000

Microsoft threat analysts have detected another evolution in GADOLINIUM’s tooling that the security community should understand when establishing defenses.

The post Microsoft Security—detecting empires in the cloud appeared first on Microsoft Security.

Read more

STRONTIUM: Detecting new patterns in credential harvesting

Credit to Author: Jim Flack| Date: Thu, 10 Sep 2020 18:45:52 +0000

Microsoft has tied STRONTIUM to a newly uncovered pattern of Office365 credential harvesting activity aimed at US and UK organizations directly involved in political elections.

The post STRONTIUM: Detecting new patterns in credential harvesting appeared first on Microsoft Security.

Read more

Microsoft Zero Trust deployment guide for your applications

Credit to Author: Jim Flack| Date: Thu, 27 Aug 2020 18:00:21 +0000

Leverage Microsoft Cloud App Security to secure your digital transformation, by protecting all your apps and resources with the principles of Zero Trust.

The post Microsoft Zero Trust deployment guide for your applications appeared first on Microsoft Security.

Read more