Improving AI-based defenses to disrupt human-operated ransomware

Credit to Author: Paul Oliveria| Date: Tue, 21 Jun 2022 16:00:00 +0000

To disrupt human-operated ransomware attacks as early as possible, we enhanced the AI-based protections in Microsoft Defender for Endpoint with a range of specialized machine learning techniques that swiftly identify and block malicious files, processes, or behavior observed during active attacks.

The post Improving AI-based defenses to disrupt human-operated ransomware appeared first on Microsoft Security Blog.

Read more

Securing your IoT with Edge Secured-core devices

Credit to Author: Christine Barrett| Date: Tue, 21 Jun 2022 06:00:00 +0000

To simplify your IoT security journey, today, we’re announcing the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog from Lenovo, ASUS and AAEON, additionally we’re also announcing the availability of devices that meet the Microsoft sponsored Edge Compute Node protection profile which is governed with industry oversight, from Scalys and Eurotech. And learn more on Microsoft’s investments in MCU security.

The post Securing your IoT with Edge Secured-core devices appeared first on Microsoft Security Blog.

Read more

How one Microsoft software engineer works to improve access management

Credit to Author: Christine Barrett| Date: Mon, 20 Jun 2022 16:00:00 +0000

Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer Rebecca Nzioki about her journey to computer science and Microsoft’s Africa Development Center in Kenya.

The post How one Microsoft software engineer works to improve access management appeared first on Microsoft Security Blog.

Read more

Why strong security solutions are critical to privacy protection

Credit to Author: Emma Jones| Date: Wed, 15 Jun 2022 16:00:00 +0000

Former three-term Ontario Information and Privacy Commissioner Ann Cavoukian, Ph.D., talks about her seven foundational principles of privacy by design and the importance of data privacy.

The post Why strong security solutions are critical to privacy protection appeared first on Microsoft Security Blog.

Read more

The many lives of BlackCat ransomware

Credit to Author: Paul Oliveria| Date: Mon, 13 Jun 2022 16:00:00 +0000

The use of an unconventional programming language, multiple target devices and possible entry points, and affiliation with prolific threat activity groups have made the BlackCat ransomware a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.

The post The many lives of BlackCat ransomware appeared first on Microsoft Security Blog.

Read more

5 ways to connect with Microsoft Security at Identiverse 2022

Credit to Author: Christine Barrett| Date: Mon, 13 Jun 2022 15:00:00 +0000

Microsoft will be attending Identiverse 2022 and would love to connect with partners and others interested in identity. Here are five ways to do that.

The post 5 ways to connect with Microsoft Security at Identiverse 2022 appeared first on Microsoft Security Blog.

Read more

Announcing 2022 Microsoft Security Excellence Awards winners

Credit to Author: Emma Jones| Date: Mon, 06 Jun 2022 15:00:00 +0000

Winners of the Microsoft Security Excellence Awards were announced as Microsoft executives and MISA members gathered for the first time in more than two years.

The post Announcing 2022 Microsoft Security Excellence Awards winners appeared first on Microsoft Security Blog.

Read more

Exposing POLONIUM activity and infrastructure targeting Israeli organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 02 Jun 2022 16:00:00 +0000

Microsoft successfully detected and disabled attack activity abusing OneDrive by a previously undocumented Lebanon-based activity group Microsoft Threat Intelligence Center (MSTIC) tracks as POLONIUM.

The post Exposing POLONIUM activity and infrastructure targeting Israeli organizations appeared first on Microsoft Security Blog.

Read more

Microsoft collaborates with Tenable to support federal cybersecurity efforts

Credit to Author: Christine Barrett| Date: Thu, 02 Jun 2022 10:00:00 +0000

In the spirit of the executive order and as part of our commitment to enhancing cybersecurity across the US, we today announce that Tenable has expanded its collaboration with the Microsoft Intelligent Security Association (MISA). Together, Microsoft and Tenable will help enhance the US government’s ability to quickly identify, investigate, prioritize, and remediate threats—and help collectively raise the country’s security posture.

The post Microsoft collaborates with Tenable to support federal cybersecurity efforts appeared first on Microsoft Security Blog.

Read more