{"id":45349,"date":"2022-02-18T12:50:05","date_gmt":"2022-02-18T12:50:05","guid":{"rendered":"http:\/\/542d84b2-0e66-4aa4-b64a-0e6c9ca5a5b3"},"modified":"2022-02-18T12:50:05","modified_gmt":"2022-02-18T12:50:05","slug":"microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/","title":{"rendered":"Microsoft aims to improve anti-phishing MFA for White House &#8216;zero trust&#8217; push"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Microsoft has laid out some key documents for federal agencies to use as they implement the White House&#8217;s &#8216;zero trust&#8217; goals within the new US cybersecurity strategy.<\/p>\n<p>In January, the Biden Administration <a href=\"https:\/\/www.zdnet.com\/article\/white-house-rolls-out-zero-trust-strategy-for-federal-agencies\/\">released its new cybersecurity strategy<\/a> following <a href=\"https:\/\/www.zdnet.com\/article\/biden-signs-order-boosting-us-cyber-posture-saying-incremental-improvements-are-not-enough\/\">President Biden&#8217;s May 2021 executive order (EO 14028), signed in the wake of the SolarWinds software supply chain attack<\/a> and ransomware attacks on critical infrastructure like Colonial Pipeline.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<p>Core to that strategy are &#8216;zero trust&#8217; architectures, for which&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/software-supply-chain-security-google-touts-its-10bn-investment-and-zero-trust-work\/\">US tech and cybersecurity vendors were canvassed for suggestions<\/a>&nbsp;by the US National Institute of Standards and Technology (NIST), specifically about how to protect software supply chains from attack. Zero trust assumes breach and that basically nothing should be trusted.<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/#link=%7B%22linkText%22:%22Cybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report)%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%23link=%7B%22role%22:%22standard%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/%23link=%7B%22linkText%22:%22Cybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report)%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%22,%22target%22:%22%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3ECybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report%3C\/strong%3E%22%7D\"><strong>Cybersecurity: Let&#8217;s get tactical<\/strong><\/a><strong> (ZDNet special report)<\/strong><\/p>\n<p>But even as supply chains are targeted, email phishing remains one of the main methods that attackers use to breach a network, creating the starting point for a later supply chain attack.<\/p>\n<p>In May, it <a href=\"https:\/\/www.zdnet.com\/article\/third-malware-strain-discovered-in-solarwinds-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener\">wasn&#8217;t known whether Russian intelligence hackers used a targeted email phishing attack<\/a> to breach SolarWinds&#8217; software build systems. But the attack group, tagged Nobelium by Microsoft, has subsequently&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-hacking-group-nobelium-is-now-targeting-the-global-it-supply-chain-microsoft-warns\/\" target=\"_blank\" rel=\"noopener\">relied heavily on credential stuffing, phishing, API abuse, and token theft<\/a> in attempts to obtain account credentials to victims&#8217; networks.<\/p>\n<p>Despite the onslaught of state-sponsored and criminal attackers targeting work account credentials, Microsoft earlier this month warned that&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/strong-authentication-protects-against-phishing-so-why-arent-more-people-using-it\/\">just 22% of customers using Azure Active Directory (AAD) had implemented strong identity authentication, such as multi-factor authentication<\/a>&nbsp;(MFA). In 2021, Microsoft blocked 25.6 billion AAD brute force authentication attacks and intercepted 35.7 billion phishing emails with Microsoft Defender for Office 365. &nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>To help protect cross-organization collaboration against phishing, Microsoft this month announced a <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/collaborate-more-securely-with-new-cross-tenant-access-settings\/ba-p\/2147077\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">public preview of cross-tenant access settings<\/a> for inbound and outbound access when both organizations use AAD, as well as reducing MFA requirements for trusted users across AAD-using organizations.<\/p>\n<p><em>&#8220;Inbound trust settings<\/em>&nbsp;let you trust the MFA external users perform in their home directories,&#8221; Microsoft explains. &nbsp;<\/p>\n<p>Upcoming zero trust capabilities aimed at countering phishing threats for organizations that collaborate with business partners and suppliers include the &#8220;ability to enforce phishing-resistant authentication for employees, business partners, and vendors for hybrid and multi-cloud environments.&#8221;<\/p>\n<p>Microsoft also plans to boost phishing-resistant MFA support, including in remote desktop protocol (RDP) scenarios. RDP is one of the <a href=\"https:\/\/www.zdnet.com\/article\/big-jump-in-rdp-attacks-as-hackers-target-staff-working-from-home\/\" target=\"_blank\" rel=\"noopener\">most common entry points for ransomware attackers<\/a>.<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/linux-malware-attacks-are-on-the-rise-and-businesses-arent-ready-for-it\/#link=%7B%22linkText%22:%22Linux%20malware%20attacks%20are%20on%20the%20rise,%20and%20businesses%20aren't%20ready%20for%20it%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/linux-malware-attacks-are-on-the-rise-and-businesses-arent-ready-for-it\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\"><strong>Linux malware attacks are on the rise, and businesses aren&#8217;t ready for it<\/strong><\/a><\/p>\n<p>Microsoft has previously <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-touts-role-in-meeting-bidens-cybersecurity-order\/\">outlined how its zero trust approach aligns with the NIST&#8217;s goal<\/a> to develop &#8220;practical, interoperable approaches&#8221; to zero trust architectures. The Cybersecurity and Infrastructure Security Agency (CISA) is also providing agencies with technical support and operational expertise in implementing zero trust. The US government hopes the private sector will also follow the federal government&#8217;s lead.&nbsp;<\/p>\n<p>For its government customers, Microsoft has now <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/17\/us-government-sets-forth-zero-trust-architecture-strategy-and-requirements\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">published five &#8216;cybersecurity assets&#8217;<\/a> explaining how to achieve a zero trust architecture from a Microsoft technology perspective. It covers: cloud adoption for Azure; rapid modernization plans; architecture scenarios mapped to NIST standards; a multi-factor authentication (MFA) deployment guide focussing on Azure Active Directory (AAD); and an <a href=\"https:\/\/indd.adobe.com\/view\/bb2c85c8-c962-4b2a-9e04-4d6801602fff\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">&#8220;interactive guide&#8221; on the EO<\/a>.<\/p>\n<p>It&#8217;s mostly a collection of existing documents, blogposts and Microsoft help articles, but it nonetheless provides a central repository for agencies moving to comply with the new federal rules.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-aims-to-improve-anti-phishing-multi-factor-authentication-for-white-house-zero-trust-push\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft plans to make it easier for organizations using Azure Active Directory to enforce multi-factor authentication for users from external organizations.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45349","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft aims to improve anti-phishing MFA for White House &#039;zero trust&#039; push 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft aims to improve anti-phishing MFA for White House &#039;zero trust&#039; push 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-18T12:50:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft aims to improve anti-phishing MFA for White House &#8216;zero trust&#8217; push\",\"datePublished\":\"2022-02-18T12:50:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/939287f50b9751efc0bf48315814b54aa3b7144a\\\/2020\\\/09\\\/09\\\/2b22ce81-a532-43f2-8ecd-1532986bef50\\\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/\",\"name\":\"Microsoft aims to improve anti-phishing MFA for White House 'zero trust' push 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/939287f50b9751efc0bf48315814b54aa3b7144a\\\/2020\\\/09\\\/09\\\/2b22ce81-a532-43f2-8ecd-1532986bef50\\\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-02-18T12:50:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/939287f50b9751efc0bf48315814b54aa3b7144a\\\/2020\\\/09\\\/09\\\/2b22ce81-a532-43f2-8ecd-1532986bef50\\\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/939287f50b9751efc0bf48315814b54aa3b7144a\\\/2020\\\/09\\\/09\\\/2b22ce81-a532-43f2-8ecd-1532986bef50\\\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft aims to improve anti-phishing MFA for White House &#8216;zero trust&#8217; push\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft aims to improve anti-phishing MFA for White House 'zero trust' push 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft aims to improve anti-phishing MFA for White House 'zero trust' push 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-18T12:50:05+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft aims to improve anti-phishing MFA for White House &#8216;zero trust&#8217; push","datePublished":"2022-02-18T12:50:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/"},"wordCount":573,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/","name":"Microsoft aims to improve anti-phishing MFA for White House 'zero trust' push 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-02-18T12:50:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/939287f50b9751efc0bf48315814b54aa3b7144a\/2020\/09\/09\/2b22ce81-a532-43f2-8ecd-1532986bef50\/istock-1163001385.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-aims-to-improve-anti-phishing-mfa-for-white-house-zero-trust-push\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft aims to improve anti-phishing MFA for White House &#8216;zero trust&#8217; push"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45349"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45349\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}