Microsoft Secure

Microsoft Secure

Secure file storage

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to securely store and search for files.
The post Secure file storage appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more

What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year’s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security.
The post Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Collaborate securely

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely, inside and outside of your organization.
The post Collaborate securely appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Removing the need for files is the next progression of attacker techniques. While fileless techniques used to be employed almost exclusively in sophisticated cyberattacks, they are now becoming widespread in common malware, too.
The post Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV appeared first on Microsoft Secure. READ MORE HERE…

Read More