Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.
The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security. READ MORE HERE…

Read more

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. This is the seventh in a series.
The post Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting appeared first on Microsoft Security. READ MORE HERE…

Read more

Protecting your organization against password spray attacks

If your users sign in with guessable passwords, you may be at risk of a password spray attack.
The post Protecting your organization against password spray attacks appeared first on Microsoft Security. READ MORE HERE…

Read more

Afternoon Cyber Tea: Building operational resilience in a digital world

On Afternoon Cyber Tea with Ann Johnson, Ann and Ian Coldwell talk about how CISOs can prepare for a cyberattack, master the magic and complexity of containers, and encourage collaboration between engineering and security.
The post Afternoon Cyber Tea: Building operational resilience in a digital world appeared first on Microsoft Security. READ MORE HERE…

Read more