Microsoft Secure

Microsoft Secure

Navigating NIS2 requirements with Microsoft Security solutions

​​NIS2 is the most comprehensive European cybersecurity directive yet, covering 18 sectors and 160,000+ companies. The Zero Trust principles addressed by Microsoft Security solutions can help you protect your organization and meet NIS2 requirements.
The post Navigating NIS2 requirements with Microsoft Security solutions appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI

Today we released the sixth edition of Cyber Signals, spotlighting the remarkable interest and impact driven by AI on the cybersecurity landscape. This includes new, joint threat intelligence Microsoft is sharing with our OpenAI partners, detailing how we are protecting AI platforms from attempted abuse by threat actors.
The post Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Staying ahead of threat actors in the age of AI

Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity includes prompt-injections, attempted misuse of large language models (LLM), and fraud.
The post Staying ahead of threat actors in the age of AI appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team

Microsoft Copilot for Security provides tangible applications to the Defender Experts’ daily work—including building incident narratives, analyzing threats, time-saving tips, upskilling, and more.
The post Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Connect with Microsoft at these cybersecurity events in 2024

Cybersecurity professionals, business decision makers, and developers involved in cybersecurity have many industry events to choose from. But with all the possibilities, they may be unsure of which one is right for them. Read on for recommendations based on your role.
The post Connect with Microsoft at these cybersecurity events in 2024 appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Join us at InfoSec Jupyterthon 2024

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]
The post Join us at InfoSec Jupyterthon 2024 appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Best practices in moving to cloud native endpoint management

This blog is the second of three that details our recommendation to adopt cloud native device management. Understand the lessons from various Intune customers in their journeys and how they achieved greater security, cost savings, and readiness for the future through their cloud transformations.
The post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Midnight Blizzard: Guidance for responders on nation-state attack

The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The Microsoft Threat Intelligence investigation identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as NOBELIUM.
The post Midnight Blizzard: Guidance for responders on nation-state attack appeared first on Microsoft Security Blog. READ MORE HERE…

Read More