Threat hunting in Azure Advanced Threat Protection (ATP)

DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Luckily, this customer had deployed Azure ATP prior to the incident and it had already normalized authentication and identity transactions within the customer network.
The post Threat hunting in Azure Advanced Threat Protection (ATP) appeared first on Microsoft Security. READ MORE HERE…

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life

In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.
The post CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life appeared first on Microsoft Security. READ MORE HERE…

Read more

Mobile threat defense and intelligence are a core part of cyber defense

To safeguard company assets, organizations need to augment their global cyber defense strategy with mobile threat intelligence.
The post Mobile threat defense and intelligence are a core part of cyber defense appeared first on Microsoft Security. READ MORE HERE…

Read more

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Microsoft Defender ATP data scientists and threat hunters collaborate to use a data science-driven approach to detecting RDP brute force attacks to protect customers against real-world threats.
The post Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks appeared first on Microsoft Security. READ MORE HERE…

Read more

Improve cyber supply chain risk management with Microsoft Azure

To keep government agencies secure in the cloud, we must keep pace and stay ahead of cyber attackers by defending the cyber supply chain with Microsoft Azure.
The post Improve cyber supply chain risk management with Microsoft Azure appeared first on Microsoft Security. READ MORE HERE…

Read more

Spear phishing campaigns—they’re sharper than you think

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.
The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security. READ MORE HERE…

Read more

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

A series on DART’s tools, techniques, and procedures for investigating cybersecurity incidents at their customer organizations. Part 1 introduces the team and gives a brief overview of the tools that DART utilizes.
The post Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1 appeared first on Microsoft Security. READ MORE HERE…

Read more

Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant

In Gartner’s third annual Magic Quadrant for Cloud Access Security Brokers (CASB), Microsoft was named a Leader based on its completeness of vision and ability to execute in the CASB market.
The post Gartner names Microsoft a Leader in the 2019 Cloud Access Security Broker (CASB) Magic Quadrant appeared first on Microsoft Security. READ MORE HERE…

Read more

Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Microsoft is positioned as a leader in The Forrester Wave™: Endpoint Security Suites, Q3 2019, receiving among the second highest scores in both the strategy and market presence categories.
The post Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave appeared first on Microsoft Security. READ MORE HERE…

Read more