Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the cloud security shared responsibility model where customer tenants are responsible for security. Security is a…
The post Best practices for defending Azure Virtual Machines appeared first on Microsoft Security. READ MORE HERE…

Read more

Work remotely, stay secure—guidance for CISOs

With many employees suddenly working from home, there are things an organization and employees can do to help remain productive without increasing cybersecurity risk.
The post Work remotely, stay secure—guidance for CISOs appeared first on Microsoft Security. READ MORE HERE…

Read more

Human-operated ransomware attacks: A preventable disaster

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.
The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security. READ MORE HERE…

Read more

Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure

Azure Security Benchmark offers a collection of over 90 security best practices and recommendations you can employ to increase the overall security and compliance of all your workloads in Azure.
The post Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure appeared first on Microsoft Security. READ MORE HERE…

Read more