Microsoft

MicrosoftSecurity

Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 02 Oct 2018 16:15:21 +0000

What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year’s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security.

The post Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 02 Oct 2018 16:15:21 +0000

What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year’s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security.

The post Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Collaborate securely

Credit to Author: toddvanderark| Date: Mon, 01 Oct 2018 16:00:26 +0000

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely, inside and outside of your organization.

The post Collaborate securely appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Credit to Author: Windows Defender Research| Date: Thu, 27 Sep 2018 16:00:24 +0000

Removing the need for files is the next progression of attacker techniques. While fileless techniques used to be employed almost exclusively in sophisticated cyberattacks, they are now becoming widespread in common malware, too.

The post Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Delivering security innovation that puts Microsoft’s experience to work for you

Credit to Author: toddvanderark| Date: Mon, 24 Sep 2018 13:00:20 +0000

Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting harder. Microsoft can help. We focus on three areas: running security operations that work for you, building enterprise-class technology, and driving partnerships for a heterogeneous world. We can tip the scales in favor of the good guys and make the world a safer place.

The post Delivering security innovation that puts Microsoft’s experience to work for you appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Office VBA + AMSI: Parting the veil on malicious macros

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 12 Sep 2018 16:02:43 +0000

As part of our continued efforts to tackle entire classes of threats, Office 365 client applications now integrate with Antimalware Scan Interface (AMSI), enabling antivirus and other security solutions to scan macros and other scripts at runtime to check for malicious behavior. Macro-based threats have always been a prevalent entry point for malware, but we

Read more

The post Office VBA + AMSI: Parting the veil on malicious macros appeared first on Microsoft Secure.

Read More