Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

Credit to Author: Todd VanderArk| Date: Thu, 13 Feb 2020 18:00:25 +0000

Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization.

The post Changing the Monolith—Part 4: Quick tech wins for a cloud-first world appeared first on Microsoft Security.

Read more

RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Credit to Author: Todd VanderArk| Date: Tue, 04 Feb 2020 17:00:55 +0000

The RSA Conference 2020 kicks off in less than three weeks—here are a few highlights to help you plan your time.

The post RSA Conference 2020—Empower your defenders with artificial intelligence and automation appeared first on Microsoft Security.

Read more

Changing the Monolith—Part 3: What’s your process?

Credit to Author: Todd VanderArk| Date: Thu, 30 Jan 2020 17:00:28 +0000

Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the Monolith—Part 3: What’s your process? appeared first on Microsoft Security.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more

Microsoft and Zscaler help organizations implement the Zero Trust model

Credit to Author: Todd VanderArk| Date: Thu, 23 Jan 2020 17:00:27 +0000

Microsoft has built deep integrations with Zscaler—a cloud-native, multitenant security platform—to help organizations with their Zero Trust journey.

The post Microsoft and Zscaler help organizations implement the Zero Trust model appeared first on Microsoft Security.

Read more

Rethinking cyber scenarios—learning (and training) as you defend

Credit to Author: Elizabeth Wolk| Date: Tue, 14 Jan 2020 17:00:55 +0000

Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. Microsoft and Circadence are working together to democratize and scale cyber readiness globally.

The post Rethinking cyber scenarios—learning (and training) as you defend appeared first on Microsoft Security.

Read more