Learn the latest cybersecurity techniques at the Microsoft Security Summit

Credit to Author: Christine Barrett| Date: Mon, 11 Apr 2022 16:00:00 +0000

On May 12, 2022, at the Microsoft Security Summit digital event, join other cybersecurity professionals in exploring how a comprehensive approach to security can empower organizations to innovate fearlessly—even in the face of evolving cyberthreats.

The post Learn the latest cybersecurity techniques at the Microsoft Security Summit appeared first on Microsoft Security Blog.

Read more

Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report

Credit to Author: Christine Barrett| Date: Wed, 06 Apr 2022 17:00:00 +0000

Microsoft was named as a Leader in The Forrester Wave™: Enterprise Detection and Response for Q1 of 2022—the ninth Leader position for Microsoft Security in a Forrester Wave™.

The post Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report appeared first on Microsoft Security Blog.

Read more

Work remotely, stay secure—guidance for CISOs

Credit to Author: Todd VanderArk| Date: Thu, 12 Mar 2020 16:00:48 +0000

With many employees suddenly working from home, there are things an organization and employees can do to help remain productive without increasing cybersecurity risk.

The post Work remotely, stay secure—guidance for CISOs appeared first on Microsoft Security.

Read more

Behavioral blocking and containment: Transforming optics into protection

Credit to Author: Eric Avena| Date: Mon, 09 Mar 2020 16:30:20 +0000

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.

The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security.

Read more

Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more

Afternoon Cyber Tea—From threat intelligence to chatbots: A look at AI in cybersecurity

Credit to Author: Todd VanderArk| Date: Mon, 10 Feb 2020 17:00:44 +0000

On this episode of Afternoon Cyber Tea, Ann Johnson and Jane Frankland discuss chatbots, AI, and increasing the number of women in cybersecurity.

The post Afternoon Cyber Tea—From threat intelligence to chatbots: A look at AI in cybersecurity appeared first on Microsoft Security.

Read more

Ghost in the shell: Investigating web shell attacks

Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000

Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.

The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.

Read more