Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective

Credit to Author: Lauren Goodwin| Date: Wed, 24 Feb 2021 17:00:04 +0000

Get insights on how to work with business leaders to manage risk and defend against sophisticated cyber threats.

The post Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective appeared first on Microsoft Security.

Read more

Becoming resilient by understanding cybersecurity risks: Part 2

Credit to Author: Lauren Goodwin| Date: Thu, 17 Dec 2020 17:00:26 +0000

Whilst this may be uncomfortable reading, the ability to pre-empt and respond quickly to these attacks is now an organizational imperative that requires a level of close collaboration and integration throughout your organization (which may not have happened to date).

The post Becoming resilient by understanding cybersecurity risks: Part 2 appeared first on Microsoft Security.

Read more

Key layers for developing a smarter SOC with CyberProof-managed Microsoft Azure security services

Credit to Author: Lauren Goodwin| Date: Tue, 17 Nov 2020 17:00:30 +0000

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA here.   Security teams are struggling to reduce the time to detect and respond to threats due to the complexity and volume of alerts being generated from multiple security technologies. With more workloads being migrated to the…

The post Key layers for developing a smarter SOC with CyberProof-managed Microsoft Azure security services appeared first on Microsoft Security.

Read more

Advanced protection for web applications in Azure with Radware’s Microsoft Security integration

Credit to Author: Teri Seals-Dormer| Date: Mon, 12 Oct 2020 16:00:42 +0000

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA here. The state of application security Companies face a wide range of security challenges, such as Open Source Foundation for Application Security Project (OWASP) vulnerabilities, advanced BOT threats and the need to manage BOTs, securing APIs, and protecting against…

The post Advanced protection for web applications in Azure with Radware’s Microsoft Security integration appeared first on Microsoft Security.

Read more

Success in security: reining in entropy

Credit to Author: Jim Flack| Date: Wed, 20 May 2020 18:00:12 +0000

Your network is unique. It’s a living, breathing system evolving over time. The applications and users performing these actions are all unique parts of the system, adding degrees of disorder and entropy to your operating environment.

The post Success in security: reining in entropy appeared first on Microsoft Security.

Read more

Protect your accounts with smarter ways to sign in on World Passwordless Day

Credit to Author: Todd VanderArk| Date: Thu, 07 May 2020 16:00:18 +0000

Given the increase in remote work, the need to go passwordless and use multi-factor authentication (MFA) is even more significant. In honor of World Passwordless Day, this blog discusses the reasons why passwordless is so important and how to get started using Azure Active Directory and some apps that are already included in Microsoft security solutions.

The post Protect your accounts with smarter ways to sign in on World Passwordless Day appeared first on Microsoft Security.

Read more

Secure the software development lifecycle with machine learning

Credit to Author: Jim Flack| Date: Thu, 16 Apr 2020 16:00:04 +0000

A collaboration between data science and security produced a machine learning model that accurately identifies and classifies security bugs based solely on report names.

The post Secure the software development lifecycle with machine learning appeared first on Microsoft Security.

Read more

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Credit to Author: Eric Avena| Date: Mon, 21 Oct 2019 15:00:56 +0000

We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.

The post Microsoft and partners design new device security requirements to protect against targeted firmware attacks appeared first on Microsoft Security.

Read more