Connect to the Intelligent Security Graph using a new API

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 17 Apr 2018 14:00:18 +0000

Most organizations deal with high volumes of security data and have dozens of security solutions in their enterprise, making the task of integrating various products and services daunting and complex. The cost, time, and resources necessary to connect systems, enable correlation of alerts, and provide access to contextual data is extremely high. These challenges hinder

Read more

Read more

Tapping the intelligent cloud to make security better and easier

Credit to Author: Jenny Erie| Date: Mon, 16 Apr 2018 20:00:33 +0000

There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking can we still keep our assets secure as we adopt cloud services?, to declaring, we are adopting cloud services in order to improve our security posture. The driving factor is generally a realization that a

Read more

Read more

Dharma ransomware resurfaces with a new variant

Credit to Author: Shriram Munde| Date: Mon, 16 Apr 2018 06:43:19 +0000

A new variant of the Dharma ransomware (‘.arrow’) has been observed in the wild. This variant appends the extension ‘.arrow’ to the files it encrypts and spreads via spam emails.   How Dharma encrypts its victim’s files Once executed, the ‘.arrow’ variant of Dharma uses the below command to disable…

Read more

Microsoft to deliver new products and strategies for security innovation at 2018 RSA Conference

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 11 Apr 2018 15:00:16 +0000

At the 2018 RSA Conference, our senior leaders will dissect modern cyber defense strategies, and reveal new products to detect and block cyber attacks when they happen. Our objective is to arm business, government and consumers with deeply integrated intelligence and threat protection capabilities across platforms and products. To this end, we have much to

Read more

Read more

Join Microsoft for a security in a day workshop

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 10 Apr 2018 20:00:06 +0000

Let’s talk about an integrated security experience. Many of our customers are in various stages of cybersecurity maturity: Initializing Firefighting No formal security program Developing Point solutions/tools for basic controls Pockets of expertise Defining Aligned to frameworks Documented controls Begins to integrate signals for faster response Managing Intelligence driven response and recovery Organization wide emphasis

Read more

Read more

Investing in the right innovation

Credit to Author: Jenny Erie| Date: Tue, 10 Apr 2018 16:00:33 +0000

RSA is around the corner which means tens of thousands of people will descend on Moscone Center in San Francisco, CA. Hundreds of innovative young companies will look for customers, props, and capital (especially at the Early Stage Expo!). Venture capitalists will look for opportunities to invest and find the next $1B IPO. Larger companies

Read more

Read more

Security baselines should underpin efforts to manage cybersecurity risk across sectors

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 09 Apr 2018 16:00:28 +0000

This post is authored byAngela McKay, Director of Cybersecurity Policy and Amanda Craig, Senior Cybersecurity Strategist, CELA. Organizations are leveraging technology to transform their operations, products, and services, and governments are increasingly focusing on how to enable such dynamic change while also managing risks to their critical infrastructure, economies, and societies. Across sectors and regions,

Read more

Read more

Announcing: new British Standard for cyber risk and resilience

Credit to Author: Jenny Erie| Date: Wed, 04 Apr 2018 16:00:35 +0000

Technology is an integral part of the fabric of everyday life. There is almost no organization that does not rely on digital services in some way in order to survive. The opportunity that technology provides also brings with it more vulnerabilities and threats as organizations and data become more connected and available. This trend results

Read more

Read more

Take these steps to stay safe from counterfeit software and fraudulent subscriptions

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 02 Apr 2018 16:00:51 +0000

This post is authored by Matt Lundy, Assistant General Counsel, Microsoft. Software piracy and fraudulent subscriptions are serious, industry-wide problems affecting consumers and organizations around the world. In 2016, 39 percent of all software installed on computers was not properly licensed, according to a survey conducted by BSA and The Software Alliance. And each year,

Read more

Read more

Working towards a more diverse future in security

Credit to Author: Jenny Erie| Date: Wed, 28 Mar 2018 16:00:31 +0000

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while womens issues were brought to

Read more

Read more

Filling the gaps in international law is essential to making cyberspace a safer place

Credit to Author: Jenny Erie| Date: Tue, 27 Mar 2018 16:00:31 +0000

A month ago, on the sidelines of the Munich Security Conference, Microsoft organized an expert workshop to discuss gaps in international law as it applies to cyberspace. We were fortunate enough to bring together twenty leading stakeholders, including international legal experts, United Nations Group of Governmental Experts on Developments in the Field of Information and

Read more

Read more