Microsoft

MicrosoftSecurity

Step 3. Protect your identities: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Wed, 16 Jan 2019 17:00:18 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In todays installment, Step 3. Protect your identities, youll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.

The post Step 3. Protect your identities: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

Credit to Author: Yinon Costica| Date: Tue, 15 Jan 2019 16:00:20 +0000

Microsoft jumped to the Challenger position in the Gartners 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerColes 2018 Leadership Compass in the same product category.

The post Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available

Credit to Author: Jonathan Trull and Sean Sweeney| Date: Thu, 10 Jan 2019 17:00:50 +0000

The Center for Internet Securitys (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365.

The post Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Credit to Author: Angela McKay| Date: Wed, 09 Jan 2019 17:00:12 +0000

Multi-stakeholder collaboration helps to build better security policies in the recently released Guide to Developing a National Cybersecurity Strategy.

The post Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges appeared first on Microsoft Secure.

Read More