Top 6 email security best practices to protect against phishing attacks and business email compromise

What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.
The post Top 6 email security best practices to protect against phishing attacks and business email compromise appeared first on Microsoft Security. READ MORE HERE…

Read more

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.
The post In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks appeared first on Microsoft Security. READ MORE HERE…

Read more

Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Microsoft is positioned as a leader in The Forrester Wave™: Endpoint Security Suites, Q3 2019, receiving among the second highest scores in both the strategy and market presence categories.
The post Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave appeared first on Microsoft Security. READ MORE HERE…

Read more

Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

A new fileless malware campaign we dubbed Nodersok delivers two very unusual LOLBins to turn infected machines into zombie proxies.
The post Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware appeared first on Microsoft Security. READ MORE HERE…

Read more

5G and IoT: How to Approach the Security Implications

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included). READ MORE HERE…

Read more

Deep learning rises: New methods for detecting malicious PowerShell

We adopted a deep learning technique that was initially developed for natural language processing and applied to expand Microsoft Defender ATP’s coverage of detecting malicious PowerShell scripts, which continue to be a critical attack vector.
The post Deep learning rises: New methods for detecting malicious PowerShell appeared first on Microsoft Security. READ MORE HERE…

Read more

Gamification Can Transform Company Cybersecurity Culture

Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture. READ MORE HERE…

Read more

Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant

Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, positioned highest in execution.
The post Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant appeared first on Microsoft Security. READ MORE HERE…

Read more

How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge

Why is asset management—a problem that has persisted for decades—still an issue in 2019? Axonius is integrating with Microsoft to understand and solve this problem.
The post How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge appeared first on Microsoft Security. READ MORE HERE…

Read more