Improve cyber supply chain risk management with Microsoft Azure

To keep government agencies secure in the cloud, we must keep pace and stay ahead of cyber attackers by defending the cyber supply chain with Microsoft Azure.
The post Improve cyber supply chain risk management with Microsoft Azure appeared first on Microsoft Security. READ MORE HERE…

Read more

Spear phishing campaigns—they’re sharper than you think

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.
The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security. READ MORE HERE…

Read more

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

A series on DART’s tools, techniques, and procedures for investigating cybersecurity incidents at their customer organizations. Part 1 introduces the team and gives a brief overview of the tools that DART utilizes.
The post Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1 appeared first on Microsoft Security. READ MORE HERE…

Read more

Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant

In Gartner’s third annual Magic Quadrant for Cloud Access Security Brokers (CASB), Microsoft was named a Leader based on its completeness of vision and ability to execute in the CASB market.
The post Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant appeared first on Microsoft Security. READ MORE HERE…

Read more

Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Microsoft is positioned as a leader in The Forrester Wave™: Endpoint Security Suites, Q3 2019, receiving among the second highest scores in both the strategy and market presence categories.
The post Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave appeared first on Microsoft Security. READ MORE HERE…

Read more

Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

A new fileless malware campaign we dubbed Nodersok delivers two very unusual LOLBins to turn infected machines into zombie proxies.
The post Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware appeared first on Microsoft Security. READ MORE HERE…

Read more

Top 5 use cases to help you make the most of your Cloud Access Security Broker

We explore five use cases for CASBs that give you an immediate return on your investment with very little deployment effort.
The post Top 5 use cases to help you make the most of your Cloud Access Security Broker appeared first on Microsoft Security. READ MORE HERE…

Read more

Automated incident response in Office 365 ATP now generally available

Powerful automation capabilities help improve the effectiveness and efficiency of investigating and responding to Office 365 alerts.
The post Automated incident response in Office 365 ATP now generally available appeared first on Microsoft Security. READ MORE HERE…

Read more

From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Machine learning and natural language processing can automate the processing of unstructured text for insightful, actionable threat intelligence.
The post From unstructured data to actionable intelligence: Using machine learning for threat intelligence appeared first on Microsoft Security. READ MORE HERE…

Read more