Cyber Signals: Defend against the new ransomware landscape

Credit to Author: Christine Barrett| Date: Mon, 22 Aug 2022 13:00:00 +0000

Today, Microsoft is excited to publish our second edition of Cyber Signals, spotlighting security trends and insights gathered from Microsoft’s 43 trillion security signals and 8,500 security experts. In this edition, we pull back the curtain on the evolving cybercrime economy and the rise of Ransomware-as-a-service (RaaS).

The post Cyber Signals: Defend against the new ransomware landscape appeared first on Microsoft Security Blog.

Read more

Guarding against supply chain attacks—Part 3: How software becomes compromised

Credit to Author: Todd VanderArk| Date: Wed, 11 Mar 2020 16:00:32 +0000

Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.

The post Guarding against supply chain attacks—Part 3: How software becomes compromised appeared first on Microsoft Security.

Read more

Behavioral blocking and containment: Transforming optics into protection

Credit to Author: Eric Avena| Date: Mon, 09 Mar 2020 16:30:20 +0000

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.

The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security.

Read more

Microsoft identity acronyms—what do they mean and how do they relate to each other?

Credit to Author: Todd VanderArk| Date: Mon, 02 Mar 2020 17:00:54 +0000

This is the first in a blog series to help lessen confusion around identity by sharing with you some of the terms used at Microsoft.

The post Microsoft identity acronyms—what do they mean and how do they relate to each other? appeared first on Microsoft Security.

Read more

Defending the power grid against supply chain attacks—Part 1: The risk defined

Credit to Author: Todd VanderArk| Date: Tue, 18 Feb 2020 17:00:31 +0000

The “Defending the power grid against supply chain attacks” blog series analyzes how supply chain attacks are conducted and the steps utilities, device manufacturers, and software providers can take to better secure critical infrastructure.

The post Defending the power grid against supply chain attacks—Part 1: The risk defined appeared first on Microsoft Security.

Read more

Afternoon Cyber Tea—From threat intelligence to chatbots: A look at AI in cybersecurity

Credit to Author: Todd VanderArk| Date: Mon, 10 Feb 2020 17:00:44 +0000

On this episode of Afternoon Cyber Tea, Ann Johnson and Jane Frankland discuss chatbots, AI, and increasing the number of women in cybersecurity.

The post Afternoon Cyber Tea—From threat intelligence to chatbots: A look at AI in cybersecurity appeared first on Microsoft Security.

Read more

Guarding against supply chain attacks—Part 2: Hardware risks

Credit to Author: Todd VanderArk| Date: Mon, 03 Feb 2020 17:00:30 +0000

Part 2 examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft’s role in reducing hardware-based attacks.

The post Guarding against supply chain attacks—Part 2: Hardware risks appeared first on Microsoft Security.

Read more