Microsoft

MicrosoftSecurity

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 02 Jul 2018 19:00:38 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blogNew FastTrack benefit: Deployment support for Co-management on Windows 10 devices.

Read more

Read More
MicrosoftSecurity

Taking apart a double zero-day sample discovered in joint hunt with ESET

Credit to Author: Windows Defender ATP| Date: Mon, 02 Jul 2018 15:00:00 +0000

In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel with ESET researchers, I was surprised to discover two new zero-day exploits in the same

Read more

Read More
MicrosoftSecurity

The need and opportunity for adaptive prevention in the cloud

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 26 Jun 2018 16:00:42 +0000

This post is authored by Michael Bargury, Data Scientist, C+E Security. The need The cloud introduces new security challenges, which differ from classic ones by diversity and scale. Once a Virtual Machine (VM) is up and running with an open internet port, it is almost instantaneously subject to vulnerability scanning and Brute Force (BF) attacks.

Read more

Read More
MicrosoftSecurity

New FastTrack benefit: Deployment support for Co-management on Windows 10 devices

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 18 Jun 2018 16:00:09 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Getting the most value out of your security deployment. We

Read more

Read More
MicrosoftSecurity

Building Zero Trust networks with Microsoft 365

Credit to Author: Windows Defender ATP| Date: Thu, 14 Jun 2018 15:00:35 +0000

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional

Read more

Read More
MicrosoftSecurity

Updating your cybersecurity strategy to enable and accelerate digital transformation

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 12 Jun 2018 19:00:35 +0000

This post is authored by Cyril Voisin, Cheif Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done. For example, it puts more control into the hands of employees, who now demand anytime, anywhere connectivity to the solutions and data they

Read more

Read More