Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report

Credit to Author: Christine Barrett| Date: Wed, 06 Apr 2022 17:00:00 +0000

Microsoft was named as a Leader in The Forrester Wave™: Enterprise Detection and Response for Q1 of 2022—the ninth Leader position for Microsoft Security in a Forrester Wave™.

The post Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report appeared first on Microsoft Security Blog.

Read more

Microsoft 365 Defender demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations

Credit to Author: Katie McCafferty| Date: Wed, 06 Apr 2022 01:30:07 +0000

For the fourth consecutive year, Microsoft 365 Defender demonstrated industry-leading protection in MITRE Engenuity’s independent ATT&CK® Enterprise Evaluations. These results highlighted the importance of taking an XDR-based approach spanning endpoints, identities, email and cloud, and the importance of both prevention and protection.

The post Microsoft 365 Defender demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations appeared first on Microsoft Security Blog.

Read more

New security features for Windows 11 will help protect hybrid work

Credit to Author: Christine Barrett| Date: Tue, 05 Apr 2022 15:00:00 +0000

Attackers haven’t wasted any time capitalizing on the rapid move to hybrid work. Every day cyber criminals and nation states alike have improved their targeting, speed and accuracy as the world adapted to working outside the office.

The post New security features for Windows 11 will help protect hybrid work appeared first on Microsoft Security Blog.

Read more

SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965

Credit to Author: Paul Oliveria| Date: Tue, 05 Apr 2022 01:11:24 +0000

Microsoft provides guidance for customers looking for protection against exploitation and ways to detect vulnerable installations on their network of the critical vulnerability CVE-2022-22965, also known as SpringShell or Spring4Shell.

The post SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965 appeared first on Microsoft Security Blog.

Read more

Microsoft protects against human-operated ransomware across the full attack chain in the 2022 MITRE Engenuity ATT&CK® Evaluations

Credit to Author: Paul Oliveria| Date: Thu, 31 Mar 2022 20:27:12 +0000

For the fourth year in a row, the independent MITRE Engenuity ATT&CK® Evaluations demonstrated that threats are no match for Microsoft’s multi-platform extended detection and response (XDR) defense capabilities.

The post Microsoft protects against human-operated ransomware across the full attack chain in the 2022 MITRE Engenuity ATT&CK® Evaluations appeared first on Microsoft Security Blog.

Read more

3 strategies to launch an effective data governance plan

Credit to Author: Emma Jones| Date: Thu, 31 Mar 2022 17:00:00 +0000

A data governance plan can help you effectively govern sensitive data so you can reduce risks from data breaches or leaks. Read three steps to launch a data governance plan.

The post 3 strategies to launch an effective data governance plan appeared first on Microsoft Security Blog.

Read more

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc

Credit to Author: Lauren Goodwin| Date: Tue, 29 Mar 2022 16:00:00 +0000

In this blog, we will share how you can increase security for on-premises and hybrid infrastructure through offerings including Azure Arc, Microsoft Defender for Cloud, and Secured-core for Azure Stack HCI.

The post 3 steps to secure your multicloud and hybrid infrastructure with Azure Arc appeared first on Microsoft Security Blog.

Read more

How a leading Microsoft engineer extends culture to service resiliency

Credit to Author: Emma Jones| Date: Wed, 23 Mar 2022 16:00:00 +0000

Nadim Abdo, Corporate Vice President of Identity and Network Access Engineering, talks with principal software engineering manager, Huiwen Ru, on her groundbreaking work to make cloud services resilient.

The post How a leading Microsoft engineer extends culture to service resiliency appeared first on Microsoft Security Blog.

Read more

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

Credit to Author: Katie McCafferty| Date: Tue, 22 Mar 2022 22:02:50 +0000

The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads.

The post DEV-0537 criminal actor targeting organizations for data exfiltration and destruction appeared first on Microsoft Security Blog.

Read more