Operational resilience begins with your commitment to and investment in cyber resilience

Credit to Author: Todd VanderArk| Date: Tue, 17 Sep 2019 16:00:37 +0000

Operational resilience cannot be achieved without a true commitment to and investment in cyber resilience.

The post Operational resilience begins with your commitment to and investment in cyber resilience appeared first on Microsoft Security.

Read more

Automated incident response in Office 365 ATP now generally available

Credit to Author: Todd VanderArk| Date: Mon, 09 Sep 2019 16:00:37 +0000

Powerful automation capabilities help improve the effectiveness and efficiency of investigating and responding to Office 365 alerts.

The post Automated incident response in Office 365 ATP now generally available appeared first on Microsoft Security.

Read more

Deep learning rises: New methods for detecting malicious PowerShell

Credit to Author: Eric Avena| Date: Tue, 03 Sep 2019 16:00:03 +0000

We adopted a deep learning technique that was initially developed for natural language processing and applied to expand Microsoft Defender ATP’s coverage of detecting malicious PowerShell scripts, which continue to be a critical attack vector.

The post Deep learning rises: New methods for detecting malicious PowerShell appeared first on Microsoft Security.

Read more

Improve security and simplify operations with Windows Defender Antivirus + Morphisec

Credit to Author: Todd VanderArk| Date: Tue, 27 Aug 2019 16:00:04 +0000

Learn how Towne Properties uses Windows Defender Antivirus and Morphisec to protect against advanced memory-based attacks while simplifying operations.

The post Improve security and simplify operations with Windows Defender Antivirus + Morphisec appeared first on Microsoft Security.

Read more

Protect against BlueKeep

Credit to Author: Todd VanderArk| Date: Thu, 08 Aug 2019 16:00:57 +0000

DART offers steps you can take to protect your network from BlueKeep, the “wormable” vulnerability that can create a large-scale outbreak due to its ability to replicate and propagate.

The post Protect against BlueKeep appeared first on Microsoft Security.

Read more

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Credit to Author: Eric Avena| Date: Wed, 31 Jul 2019 16:30:35 +0000

The deep integration of Windows Defender Antivirus with hardware-based isolation capabilities allows the detection of artifacts of attacks that tamper with kernel-mode agents at the hypervisor level.

The post How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection appeared first on Microsoft Security.

Read more

Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack

Credit to Author: Eric Avena| Date: Mon, 08 Jul 2019 16:00:51 +0000

Advanced technologies in Microsoft Defender ATP’s Antivirus exposed and defeated a widespread fileless campaign that completely “lived off the land” throughout a complex attack chain that run the info-stealing backdoor Astaroth directly in memory

The post Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack appeared first on Microsoft Security.

Read more

Council of EU Law Enforcement Protocol improves cross-border cooperation

Credit to Author: Todd VanderArk| Date: Tue, 30 Jul 2019 16:00:00 +0000

The new EU Law Enforcement Emergency Response Protocol addresses the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries.

The post Council of EU Law Enforcement Protocol improves cross-border cooperation appeared first on Microsoft Security.

Read more

How to cost-effectively manage and secure a mobile ecosystem

Credit to Author: Todd VanderArk| Date: Tue, 16 Jul 2019 16:00:44 +0000

In a world of booming mobility, Pradeo Security Mobile Threat Defense and Microsoft are partnering together for a brighter and more secure future.

The post How to cost-effectively manage and secure a mobile ecosystem appeared first on Microsoft Security.

Read more