Improve cyber supply chain risk management with Microsoft Azure

Credit to Author: Todd VanderArk| Date: Mon, 09 Dec 2019 17:00:03 +0000

To keep government agencies secure in the cloud, we must keep pace and stay ahead of cyber attackers by defending the cyber supply chain with Microsoft Azure.

The post Improve cyber supply chain risk management with Microsoft Azure appeared first on Microsoft Security.

Read more

Microsoft Security—a Leader in 5 Gartner Magic Quadrants

Credit to Author: Todd VanderArk| Date: Tue, 03 Dec 2019 17:00:21 +0000

Gartner has named Microsoft Security a Leader in five Magic Quadrants, which demonstrates balanced progress and effort in all execution and vision categories.

The post Microsoft Security—a Leader in 5 Gartner Magic Quadrants appeared first on Microsoft Security.

Read more

Spear phishing campaigns—they’re sharper than you think

Credit to Author: Todd VanderArk| Date: Mon, 02 Dec 2019 17:00:15 +0000

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.

The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security.

Read more

Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant

Credit to Author: Eric Avena| Date: Tue, 26 Nov 2019 18:09:21 +0000

In Gartner’s annual Magic Quadrant for Enterprise Information Archiving (EIA), Microsoft was named a Leader again.

The post Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant appeared first on Microsoft Security.

Read more

Insights from one year of tracking a polymorphic threat

Credit to Author: Eric Avena| Date: Tue, 26 Nov 2019 17:00:56 +0000

We discovered the polymoprhic threat Dexphot in October 2018. In the months that followed, we closely tracked the threat as attackers upgraded the malware, targeted new processes, and worked around defensive measures. One year’s worth of intelligence helped us gain insight not only into the goals and motivations of Dexphot’s authors, but of cybercriminals in general.

The post Insights from one year of tracking a polymorphic threat appeared first on Microsoft Security.

Read more

Going in-depth on the Windows 10 random number generation infrastructure

Credit to Author: Eric Avena| Date: Mon, 25 Nov 2019 19:00:33 +0000

We are happy to release to the public The Windows 10 random number generation infrastructure white paper, which provides details about the Windows 10 pseudo-random number generator (PRNG) infrastructure, and lists the primary RNG APIs. The whitepaper also explains how the entropy system works, what the entropy sources are, and how initial seeding works.

The post Going in-depth on the Windows 10 random number generation infrastructure appeared first on Microsoft Security.

Read more

Rethinking cyber learning—consider gamification

Credit to Author: Todd VanderArk| Date: Mon, 25 Nov 2019 17:00:55 +0000

Gamified cybersecurity solutions offer immense promise by giving users practical, hands-on opportunities to learn by doing. Microsoft and Circadence are partnering to deliver Azure-hosted cyber range learning solutions for beginners up to advanced SecOps pros. Gamification is an increasingly important way for enterprises to attract tomorrow’s cyber pro talent and create tailored learning and more defined career paths and progression.

The post Rethinking cyber learning—consider gamification appeared first on Microsoft Security.

Read more

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

Credit to Author: Todd VanderArk| Date: Thu, 14 Nov 2019 17:00:56 +0000

A series on DART’s tools, techniques, and procedures for investigating cybersecurity incidents at their customer organizations. Part 1 introduces the team and gives a brief overview of the tools that DART utilizes.

The post Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1 appeared first on Microsoft Security.

Read more

Zero Trust strategy—what good looks like

Credit to Author: Todd VanderArk| Date: Mon, 11 Nov 2019 17:00:11 +0000

Zero Trust is a model that will ultimately be infused throughout your enterprise and should inform virtually all access decisions and interactions between systems.

The post Zero Trust strategy—what good looks like appeared first on Microsoft Security.

Read more

Microsoft works with researchers to detect and protect against new RDP exploits

Credit to Author: Eric Avena| Date: Thu, 07 Nov 2019 21:05:30 +0000

The new exploit attacks show that BlueKeep will be a threat as long as systems remain unpatched, credential hygiene is not achieved, and overall security posture is not kept in check.

The post Microsoft works with researchers to detect and protect against new RDP exploits appeared first on Microsoft Security.

Read more