Microsoft Secure

Microsoft Secure

Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

Microsoft jumped to the Challenger position in the Gartners 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerColes 2018 Leadership Compass in the same product category.
The post Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available

The Center for Internet Securitys (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365.
The post Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Multi-stakeholder collaboration helps to build better security policies in the recently released Guide to Developing a National Cybersecurity Strategy.
The post Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Windows Defender ATP has protections for USB and removable devices

Meet Jimmy. Jimmy is an employee in your company. He Does Things With Computers (official title). Last Wednesday, as Jimmy got out of his car after parking in the company-owned parking lot, he saw something on the ground. That something is a 512GB USB flash drive! Jimmy picks up the drive, whistling along to himself
Read more
The post Windows Defender ATP has protections for USB and removable devices appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Tackling phishing with signal-sharing and machine learning

Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure. Our industry-leading visibility into the entire attack chain translates to enriched protection thats evident in many different attack scenarios, including flashy cyberattacks, massive malware campaigns, and even small-scale, localized
Read more
The post Tackling phishing with signal-sharing and machine learning appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we explain how to enable single sign-on (SSO) in Azure Active Directory (Azure AD) to manage authentication across devices, cloud apps, and on-premises apps, and then how to set up Multi-Factor Authentication (MFA) to authenticate user sign-ins through a mobile app, phone call, or SMS.
The post Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment appeared first on Microsoft Secure. READ MORE HERE…

Read More