Spear phishing campaigns—they’re sharper than you think

Credit to Author: Todd VanderArk| Date: Mon, 02 Dec 2019 17:00:15 +0000

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.

The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security.

Read more

Rethinking cyber learning—consider gamification

Credit to Author: Todd VanderArk| Date: Mon, 25 Nov 2019 17:00:55 +0000

Gamified cybersecurity solutions offer immense promise by giving users practical, hands-on opportunities to learn by doing. Microsoft and Circadence are partnering to deliver Azure-hosted cyber range learning solutions for beginners up to advanced SecOps pros. Gamification is an increasingly important way for enterprises to attract tomorrow’s cyber pro talent and create tailored learning and more defined career paths and progression.

The post Rethinking cyber learning—consider gamification appeared first on Microsoft Security.

Read more

Zero Trust strategy—what good looks like

Credit to Author: Todd VanderArk| Date: Mon, 11 Nov 2019 17:00:11 +0000

Zero Trust is a model that will ultimately be infused throughout your enterprise and should inform virtually all access decisions and interactions between systems.

The post Zero Trust strategy—what good looks like appeared first on Microsoft Security.

Read more

Thinking about the balance between compliance and security

Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 17:00:55 +0000

Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.

The post Thinking about the balance between compliance and security appeared first on Microsoft Security.

Read more

How to balance compliance and security with limited resources

Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 17:00:55 +0000

Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.

The post How to balance compliance and security with limited resources appeared first on Microsoft Security.

Read more

Microsoft’s 4 principles for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principles for an effective security operations center appeared first on Microsoft Security.

Read more

Microsoft’s 4 principals for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principals for an effective security operations center appeared first on Microsoft Security.

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

Credit to Author: Todd VanderArk| Date: Mon, 07 Oct 2019 21:20:56 +0000

In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.

The post CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools appeared first on Microsoft Security.

Read more