cybersecurity

SecurityTrendMicro

This Week in Security News: Hacker Strategies and Spyware Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Feb 2019 14:00:13 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how hackers are improving their breach strategies. Also, learn about new spyware attacks via URLs, websites, and mobile apps. Read on:  Informing Your Security Posture:…

The post This Week in Security News: Hacker Strategies and Spyware Attacks appeared first on .

Read More
MicrosoftSecurity

Step 4. Set conditional access policies: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Wed, 30 Jan 2019 17:00:12 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and corporate resources using conditional access policies, and how these policies can block legacy authentication methods and control access to SaaS apps.

The post Step 4. Set conditional access policies: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees

Credit to Author: Sue Bohn| Date: Wed, 23 Jan 2019 17:00:01 +0000

Not another portal, not another password! Learn how lululemon implemented Azure AD for cloud Identity and Access Management, simplifying user access without reducing business flexibility.

The post Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees appeared first on Microsoft Secure.

Read More