Updating your cybersecurity strategy to enable and accelerate digital transformation

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 12 Jun 2018 19:00:35 +0000

This post is authored by Cyril Voisin, Cheif Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done. For example, it puts more control into the hands of employees, who now demand anytime, anywhere connectivity to the solutions and data they

Read more

Read more

Quick Heal detects banking Trojans imitating popular social media and banking apps in India

Credit to Author: Bajrang Mane| Date: Tue, 05 Jun 2018 13:40:33 +0000

Quick Heal Security Labs has spotted two banking Trojan malware. These malware imitate some popular social and banking apps. While doing so, they gain access to some security permissions on the infected device which allow them to steal the user’s banking credentials. The malware are able to do this by…

Read more

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

Credit to Author: Jenny Erie| Date: Wed, 06 Jun 2018 16:00:31 +0000

The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it. How to use it We have seen this document used for

Read more

Read more

Quick Heal detects another banking Trojan imitating popular banking apps in India

Credit to Author: Bajrang Mane| Date: Tue, 05 Jun 2018 13:40:33 +0000

Quick Heal Security Labs has spotted a banking Trojan malware. The malware imitates some popular social, banking and finance apps. While doing so, it gains access to some security permissions on the infected device which allow it to steal the user’s banking credentials. The Trojan is able to do this…

Read more

Getting the most value out of your security deployment

Credit to Author: Microsoft Secure Blog Staff| Date: Thu, 31 May 2018 16:00:38 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Now that you have a plan, its time to start

Read more

Read more

From the ground up to the cloud: Microsoft’s Intelligent Security supporting CISOs’ cloud transformation

Credit to Author: Jenny Erie| Date: Wed, 30 May 2018 19:00:57 +0000

Its no secret that Microsoft has embraced the cloud in a big wayfrom enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to securityintegrating workforce and cloud security in ways that make them much easier for enterprise IT

Read more

Read more

Data classification and protection now available for structured data in SQL

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 23 May 2018 16:00:55 +0000

This post is authored by Gilad Mittelman, Senior Program Manager, SQL Data Security. Data privacy and data security have become one of the most prominent topics in organizations in almost every industry across the globe. New regulations that formalize requirements are emerging around these topics and compel organizations to comply. The upcoming EU Global Data

Read more

Read more

Now that you have a plan, it’s time to start deploying

Credit to Author: Microsoft Secure Blog Staff| Date: Thu, 17 May 2018 20:00:58 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog First Things First: Envisioning Your Security Deployment. In our previous

Read more

Read more

Securing the modern workplace with Microsoft 365 threat protection – part 4

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 16 May 2018 21:00:55 +0000

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Responding to ransomware in the Modern Workplace Over the last few weeks, we have shared the roots of Microsoft 365 threat protection and how Microsoft 365 threat protection helps protect against and detect a modern ransomware attack. Today, we conclude our

Read more

Read more

The final compliance countdown: Are you ready for GDPR?

Credit to Author: Microsoft Secure Blog Staff| Date: Thu, 10 May 2018 19:00:22 +0000

On May 25, the General Data Protection Regulation (GDPR) will replace the Data Protection Directive as the new standard on data privacy for all organizations that do business with European Union (EU) citizens.[1]When GDPR goes into effect, government agencies and organizations that control, maintain, or process information involving EU citizens will be required to comply

Read more

Read more