Spear phishing campaigns—they’re sharper than you think

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.
The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security. READ MORE HERE…

Read more

Rethinking cyber learning—consider gamification

Gamified cybersecurity solutions offer immense promise by giving users practical, hands-on opportunities to learn by doing. Microsoft and Circadence are partnering to deliver Azure-hosted cyber range learning solutions for beginners up to advanced SecOps pros. Gamification is an increasingly important way for enterprises to attract tomorrow’s cyber pro talent and create tailored learning and more defined career paths and progression.
The post Rethinking cyber learning—consider gamification appeared first on Microsoft Security. READ MORE HERE…

Read more

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.
The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security. READ MORE HERE…

Read more

Microsoft’s 4 principals for an effective security operations center

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.
The post Microsoft’s 4 principals for an effective security operations center appeared first on Microsoft Security. READ MORE HERE…

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.
The post CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools appeared first on Microsoft Security. READ MORE HERE…

Read more