IoT security will set innovation free: Azure Sphere general availability scheduled for February 2020

Credit to Author: Todd VanderArk| Date: Mon, 28 Oct 2019 13:00:37 +0000

Azure Sphere will be generally available in February of 2020, marking our readiness to fulfill our security promise at scale.

The post IoT security will set innovation free: Azure Sphere general availability scheduled for February 2020 appeared first on Microsoft Security.

Read more

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Credit to Author: Todd VanderArk| Date: Wed, 23 Oct 2019 19:00:33 +0000

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.

The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security.

Read more

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Credit to Author: Eric Avena| Date: Mon, 21 Oct 2019 15:00:56 +0000

We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.

The post Microsoft and partners design new device security requirements to protect against targeted firmware attacks appeared first on Microsoft Security.

Read more

Best practices for adding layered security to Azure security with Check Point’s CloudGuard IaaS

Credit to Author: Todd VanderArk| Date: Fri, 18 Oct 2019 01:00:03 +0000

Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices.

The post Best practices for adding layered security to Azure security with Check Point’s CloudGuard IaaS appeared first on Microsoft Security.

Read more

Microsoft’s 4 principles for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principles for an effective security operations center appeared first on Microsoft Security.

Read more

Top 6 email security best practices to protect against phishing attacks and business email compromise

Credit to Author: Eric Avena| Date: Wed, 16 Oct 2019 17:00:11 +0000

What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.

The post Top 6 email security best practices to protect against phishing attacks and business email compromise appeared first on Microsoft Security.

Read more

Microsoft’s 4 principals for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principals for an effective security operations center appeared first on Microsoft Security.

Read more

Patching as a social responsibility

Credit to Author: Todd VanderArk| Date: Wed, 09 Oct 2019 16:00:59 +0000

To plan, implement, and improve an enterprise patch management strategy, Microsoft is partnering with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE). Learn how you can also help.

The post Patching as a social responsibility appeared first on Microsoft Security.

Read more

How to avoid getting caught in a “Groundhog Day” loop of security issues

Credit to Author: Todd VanderArk| Date: Tue, 08 Oct 2019 16:00:58 +0000

One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.

The post How to avoid getting caught in a “Groundhog Day” loop of security issues appeared first on Microsoft Security.

Read more