cybersecurity

MicrosoftSecurity

Tackling phishing with signal-sharing and machine learning

Credit to Author: Windows Defender Research| Date: Wed, 19 Dec 2018 16:00:11 +0000

Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure. Our industry-leading visibility into the entire attack chain translates to enriched protection thats evident in many different attack scenarios, including flashy cyberattacks, massive malware campaigns, and even small-scale, localized

Read more

The post Tackling phishing with signal-sharing and machine learning appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Mon, 17 Dec 2018 17:00:23 +0000

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we explain how to enable single sign-on (SSO) in Azure Active Directory (Azure AD) to manage authentication across devices, cloud apps, and on-premises apps, and then how to set up Multi-Factor Authentication (MFA) to authenticate user sign-ins through a mobile app, phone call, or SMS.

The post Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Microsoft AI competition explores the next evolution of predictive technologies in security

Credit to Author: Windows Defender Research| Date: Thu, 13 Dec 2018 19:00:54 +0000

Predictive technologies are already effective at detecting and blocking malware at first sight. A new malware prediction competition on Kaggle will challenge the data science community to push these technologies even furtherto stop malware before it is even seen. The Microsoft-sponsored competition calls for participants to predict if a device is likely to encounter malware

Read more

The post Microsoft AI competition explores the next evolution of predictive technologies in security appeared first on Microsoft Secure.

Read More
ScadaICSSchneider

3 points of CISO advice for strengthening a cybersecurity ecosystem

Credit to Author: Christophe Blassiau| Date: Wed, 12 Dec 2018 02:40:13 +0000

A PwC study last year revealed that about 62% of global CEOs worry that cyber threats will affect their company’s growth prospects.[i] As a result, it is not surprising that… Read more »

The post 3 points of CISO advice for strengthening a cybersecurity ecosystem appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

The evolution of Microsoft Threat Protection, December update

Credit to Author: Debraj Ghosh| Date: Wed, 12 Dec 2018 17:00:00 +0000

December was another month of significant development for Microsoft Threat Protection capabilities. As a quick recap, Microsoft Threat Protection is an integrated solution securing the modern workplace across identities, endpoints, user data, cloud apps, and infrastructure. Last month, we shared updates on capabilities for securing identities, endpoints, user data, and cloud apps. This month, we

Read more

The post The evolution of Microsoft Threat Protection, December update appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge

Credit to Author: Sue Bohn| Date: Tue, 11 Dec 2018 17:00:02 +0000

The Voice of the Customer blog series is designed to help you by sharing stories from real customers who are solving their identity and security challenges using Azure AD.

The post Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge appeared first on Microsoft Secure.

Read More