2022 holiday DDoS protection guide

Credit to Author: Paul Oliveria| Date: Tue, 15 Nov 2022 18:00:00 +0000

The holiday season is an exciting time for many people as they get to relax, connect with friends and family, and celebrate traditions. Organizations also have much to rejoice about during the holidays (for example, more sales for retailers and more players for gaming companies). Unfortunately, cyber attackers also look forward to this time of year to celebrate an emerging holiday tradition—distributed denial-of-service (DDoS) attacks.

The post 2022 holiday DDoS protection guide appeared first on Microsoft Security Blog.

Read more

How companies can prepare for a heightened threat environment

Credit to Author: Todd VanderArk| Date: Mon, 20 Jan 2020 17:00:31 +0000

Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk.

The post How companies can prepare for a heightened threat environment appeared first on Microsoft Security.

Read more

Thinking about the balance between compliance and security

Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 17:00:55 +0000

Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.

The post Thinking about the balance between compliance and security appeared first on Microsoft Security.

Read more

How to balance compliance and security with limited resources

Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 17:00:55 +0000

Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.

The post How to balance compliance and security with limited resources appeared first on Microsoft Security.

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

Credit to Author: Todd VanderArk| Date: Mon, 07 Oct 2019 21:20:56 +0000

In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.

The post CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools appeared first on Microsoft Security.

Read more

Are students prepared for real-world cyber curveballs?

Credit to Author: Todd VanderArk| Date: Thu, 12 Sep 2019 16:00:55 +0000

Are today’s students getting the preparation they need to do the cybersecurity work of tomorrow? Read the findings from the U.S. Department of Energy (DOE) CyberForce Competition.™

The post Are students prepared for real-world cyber curveballs? appeared first on Microsoft Security.

Read more

4 best practices to help you integrate security into DevOps

Credit to Author: Todd VanderArk| Date: Tue, 11 Jun 2019 16:00:45 +0000

Learn how Microsoft evolved its culture, teams, and practices to integrate security into an agile development process that supports a cloud-based world.

The post 4 best practices to help you integrate security into DevOps appeared first on Microsoft Security.

Read more