New cloud-native breadth threat protection capabilities in Azure Defender

As the world adapts to working remotely, the threat landscape is constantly evolving, and security teams struggle to protect workloads with multiple solutions that are often not well integrated nor comprehensive enough. This results in serious threats avoiding detection, as well as security teams suffering from alert fatigue. Azure Defender helps security professionals with an…
The post New cloud-native breadth threat protection capabilities in Azure Defender appeared first on Microsoft Security. READ MORE HERE…

Read more

Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA here.   Security teams are struggling to reduce the time to detect and respond to threats due to the complexity and volume of alerts being generated from multiple security technologies. With more workloads being migrated to the…
The post Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services appeared first on Microsoft Security. READ MORE HERE…

Read more

Advanced protection for web applications in Azure with Radware’s Microsoft Security integration

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA here. The state of application security Companies face a wide range of security challenges, such as Open Source Foundation for Application Security Project (OWASP) vulnerabilities, advanced BOT threats and the need to manage BOTs, securing APIs, and protecting against…
The post Advanced protection for web applications in Azure with Radware’s Microsoft Security integration appeared first on Microsoft Security. READ MORE HERE…

Read more

Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the cloud security shared responsibility model where customer tenants are responsible for security. Security is a…
The post Best practices for defending Azure Virtual Machines appeared first on Microsoft Security. READ MORE HERE…

Read more

Vectra and Microsoft join forces to step up detection and response

SOCs combine NDR visibility with EDR insight, couples them with analytics from sources in the SIEM to detect and stop attacks evading perimeter defenses.
The post Vectra and Microsoft join forces to step up detection and response appeared first on Microsoft Security. READ MORE HERE…

Read more

Microsoft Security: Use baseline default tools to accelerate your security career

As you build your cybersecurity career, take advantage of important new and proactive security configuration and management capabilities that will help your organization ‘move left’ on understanding and reducing risk.
The post Microsoft Security: Use baseline default tools to accelerate your security career appeared first on Microsoft Security. READ MORE HERE…

Read more

Microsoft Intelligent Security Association expands to include managed security service providers

The Microsoft Intelligent Security Association expands to include Security MSSPs, through a pilot program that launched July 2020.
The post Microsoft Intelligent Security Association expands to include managed security service providers appeared first on Microsoft Security. READ MORE HERE…

Read more

The world is your authentication and identity oyster

For decades we have been taught that passwords are some level of security that can be implemented to protect websites. We need to dispel this unfortunate notion.
The post The world is your authentication and identity oyster appeared first on Microsoft Security. READ MORE HERE…

Read more

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Microsoft is providing a series of deployment guides for customers who have engaged in a Zero Trust security strategy to configure Azure Active Directory (Azure AD) capabilities.
The post Zero Trust Deployment Guide for Microsoft Azure Active Directory appeared first on Microsoft Security. READ MORE HERE…

Read more

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

This integration empowers Windows to natively understand Azure Information Protection sensitivity labels, to provide visibility into sensitive data on endpoints, to protect sensitive data based on its content, and to detect and respond to post-breach malicious activity that involves or affects sensitive data.
The post Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices appeared first on Microsoft Secure. READ MORE HERE…

Read more