Microsoft Secure

Microsoft Secure

Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the cloud security shared responsibility model where customer tenants are responsible for security. Security is a…
The post Best practices for defending Azure Virtual Machines appeared first on Microsoft Security. READ MORE HERE…

Read More
Microsoft Secure

Why we invite security researchers to hack Azure Sphere

Fighting the security battle so our customers don’t have to IoT devices are becoming more prevalent in almost every aspect of our lives—we will rely on them in our homes, our businesses, as well as our infrastructure. In February, Microsoft announced the general availability of Azure Sphere, an integrated security solution for IoT devices and…
The post Why we invite security researchers to hack Azure Sphere appeared first on Microsoft Security. READ MORE HERE…

Read More
Microsoft Secure

Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security

Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world can prevent 100 percent of phishing attacks from hitting user inboxes. At that point in…
The post Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security appeared first on Microsoft Security. READ MORE HERE…

Read More
Microsoft Secure

Microsoft Advanced Compliance Solutions in Zero Trust Architecture

Zero Trust architecture starts with Identity and Access Management but it doesn’t end there. Microsoft Advanced Compliance solutions complement Azure Active Directory and Conditional Access with important protections around the data, applications and network pillars.
The post Microsoft Advanced Compliance Solutions in Zero Trust Architecture appeared first on Microsoft Security. READ MORE HERE…

Read More