Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective

Credit to Author: Lauren Goodwin| Date: Wed, 24 Feb 2021 17:00:04 +0000

Get insights on how to work with business leaders to manage risk and defend against sophisticated cyber threats.

The post Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective appeared first on Microsoft Security.

Read more

Using Zero Trust principles to protect against sophisticated attacks like Solorigate

Credit to Author: Lauren Goodwin| Date: Tue, 19 Jan 2021 22:30:50 +0000

The Solorigate supply chain attack has captured the focus of the world over the last month. This attack was simultaneously sophisticated and ordinary. The actor demonstrated sophistication in the breadth of tactics used to penetrate, expand across, and persist in affected infrastructure, but many of the tactics, techniques, and procedures (TTPs) were individually ordinary. Companies…

The post Using Zero Trust principles to protect against sophisticated attacks like Solorigate appeared first on Microsoft Security.

Read more

Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

Credit to Author: Teri Seals-Dormer| Date: Wed, 06 Jan 2021 17:00:09 +0000

GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of relevant regulatory information, they must report it within the required time frame. The size and scope of this reporting effort can be massive. Using Microsoft 365 Advanced Audit and Advanced eDiscovery to better understand the scope of the breach can minimize the burden on customers as well as the financial and reputational cost to the organization.

The post Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact appeared first on Microsoft Security.

Read more

A “quick wins” approach to securing Azure Active Directory and Office 365 and improving your security posture

Credit to Author: Lauren Goodwin| Date: Thu, 17 Dec 2020 21:00:56 +0000

This blog post will explain simple Microsoft security defaults and Secure Score—two features you should take advantage of that are easy to utilize and can significantly improve security in Azure AD and Office 365 configurations.

The post A “quick wins” approach to securing Azure Active Directory and Office 365 and improving your security posture appeared first on Microsoft Security.

Read more

Becoming resilient by understanding cybersecurity risks: Part 2

Credit to Author: Lauren Goodwin| Date: Thu, 17 Dec 2020 17:00:26 +0000

Whilst this may be uncomfortable reading, the ability to pre-empt and respond quickly to these attacks is now an organizational imperative that requires a level of close collaboration and integration throughout your organization (which may not have happened to date).

The post Becoming resilient by understanding cybersecurity risks: Part 2 appeared first on Microsoft Security.

Read more

Cyberattacks targeting health care must stop

Credit to Author: Teri Seals-Dormer| Date: Wed, 18 Nov 2020 19:00:56 +0000

In recent months, we’ve detected cyberattacks from three nation-state actors targeting seven prominent companies directly involved in researching vaccines and treatments for COVID-19. The targets include leading pharmaceutical companies and vaccine researchers in Canada, France, India, South Korea, and the United States. The attacks came from Strontium, an actor originating from Russia, and two actors…

The post Cyberattacks targeting health care must stop appeared first on Microsoft Security.

Read more

Becoming resilient by understanding cybersecurity risks: Part 1

Credit to Author: Teri Seals-Dormer| Date: Tue, 13 Oct 2020 19:00:37 +0000

All risks have to be viewed through the lens of the business or organization. While information on cybersecurity risks is plentiful, you can’t prioritize or manage any risk until the impact (and likelihood) to your organization is understood and quantified. This rule of thumb on who should be accountable for risk helps illustrate this relationship:…

The post Becoming resilient by understanding cybersecurity risks: Part 1 appeared first on Microsoft Security.

Read more

Why we invite security researchers to hack Azure Sphere

Credit to Author: Teri Seals-Dormer| Date: Tue, 06 Oct 2020 16:00:04 +0000

Fighting the security battle so our customers don’t have to IoT devices are becoming more prevalent in almost every aspect of our lives—we will rely on them in our homes, our businesses, as well as our infrastructure. In February, Microsoft announced the general availability of Azure Sphere, an integrated security solution for IoT devices and…

The post Why we invite security researchers to hack Azure Sphere appeared first on Microsoft Security.

Read more