Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios

Increased remote work has many organizations rethinking network and security strategies. In this post we share guidance on how to manage security in this changing environment.
The post Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios appeared first on Microsoft Security. READ MORE HERE…

Read more

Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Astaroth is back sporting significant changes. The updated attack chain maintains Astaroth’s complex, multi-component nature and continues its pattern of detection evasion.
The post Latest Astaroth living-off-the-land attacks are even more invisible but not less observable appeared first on Microsoft Security. READ MORE HERE…

Read more

Protecting against coronavirus themed phishing attacks

Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought now would be a good time to share some best practices and useful information.
The post Protecting against coronavirus themed phishing attacks appeared first on Microsoft Security. READ MORE HERE…

Read more

Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave

I’m proud to announce that Microsoft is positioned as a Leader in The Forrester Wave™: Enterprise Detection and Response, Q1 2020.
The post Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave appeared first on Microsoft Security. READ MORE HERE…

Read more

Guarding against supply chain attacks—Part 3: How software becomes compromised

Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.
The post Guarding against supply chain attacks—Part 3: How software becomes compromised appeared first on Microsoft Security. READ MORE HERE…

Read more

Behavioral blocking and containment: Transforming optics into protection

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.
The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security. READ MORE HERE…

Read more

Human-operated ransomware attacks: A preventable disaster

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.
The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security. READ MORE HERE…

Read more

Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals

Azure Sentinel Fusion technology uses powerful machine learning methods to enable your SecOps team to focus on the threats that matter.
The post Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals appeared first on Microsoft Security. READ MORE HERE…

Read more