Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios

Increased remote work has many organizations rethinking network and security strategies. In this post we share guidance on how to manage security in this changing environment.
The post Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios appeared first on Microsoft Security. READ MORE HERE…

Read more

Protecting against coronavirus themed phishing attacks

Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought now would be a good time to share some best practices and useful information.
The post Protecting against coronavirus themed phishing attacks appeared first on Microsoft Security. READ MORE HERE…

Read more

Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave

I’m proud to announce that Microsoft is positioned as a Leader in The Forrester Wave™: Enterprise Detection and Response, Q1 2020.
The post Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave appeared first on Microsoft Security. READ MORE HERE…

Read more

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Secured-core PCs combine virtualization, operating system, and hardware and firmware protection. Along with Microsoft Defender ATP, Secured-core PCs provide end-to-end protection against advanced attacks that leverage driver vulnerabilities to gain kernel privileges.
The post Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks appeared first on Microsoft Security. READ MORE HERE…

Read more

Behavioral blocking and containment: Transforming optics into protection

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.
The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security. READ MORE HERE…

Read more

Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals

Azure Sentinel Fusion technology uses powerful machine learning methods to enable your SecOps team to focus on the threats that matter.
The post Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals appeared first on Microsoft Security. READ MORE HERE…

Read more

Threat hunting in Azure Advanced Threat Protection (ATP)

DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Luckily, this customer had deployed Azure ATP prior to the incident and it had already normalized authentication and identity transactions within the customer network.
The post Threat hunting in Azure Advanced Threat Protection (ATP) appeared first on Microsoft Security. READ MORE HERE…

Read more