In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Credit to Author: Eric Avena| Date: Tue, 08 Oct 2019 15:00:11 +0000

Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.

The post In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks appeared first on Microsoft Security.

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

Credit to Author: Todd VanderArk| Date: Mon, 07 Oct 2019 21:20:56 +0000

In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.

The post CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools appeared first on Microsoft Security.

Read more

Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Credit to Author: Eric Avena| Date: Tue, 01 Oct 2019 17:30:05 +0000

Microsoft is positioned as a leader in The Forrester Wave™: Endpoint Security Suites, Q3 2019, receiving among the second highest scores in both the strategy and market presence categories.

The post Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave appeared first on Microsoft Security.

Read more

TLS version enforcement capabilities now available per certificate binding on Windows Server 2019

Credit to Author: Todd VanderArk| Date: Mon, 30 Sep 2019 16:00:00 +0000

Microsoft is pleased to announce a powerful new feature in Windows to make your transition to a TLS 1.2+ world easier.

The post TLS version enforcement capabilities now available per certificate binding on Windows Server 2019 appeared first on Microsoft Security.

Read more

Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

Credit to Author: Eric Avena| Date: Thu, 26 Sep 2019 17:34:41 +0000

A new fileless malware campaign we dubbed Nodersok delivers two very unusual LOLBins to turn infected machines into zombie proxies.

The post Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware appeared first on Microsoft Security.

Read more

How to prevent phishing attacks that target your customers with DMARC and Office 365

Credit to Author: Todd VanderArk| Date: Thu, 26 Sep 2019 16:00:28 +0000

DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages.

The post How to prevent phishing attacks that target your customers with DMARC and Office 365 appeared first on Microsoft Security.

Read more

Top 5 use cases to help you make the most of your Cloud Access Security Broker

Credit to Author: Todd VanderArk| Date: Wed, 25 Sep 2019 16:00:25 +0000

We explore five use cases for CASBs that give you an immediate return on your investment with very little deployment effort.

The post Top 5 use cases to help you make the most of your Cloud Access Security Broker appeared first on Microsoft Security.

Read more

Azure Sentinel—the cloud-native SIEM that empowers defenders is now generally available

Credit to Author: Todd VanderArk| Date: Tue, 24 Sep 2019 16:00:55 +0000

Our goal has remained the same since we first launched Microsoft Azure Sentinel in February: empower security operations teams to help enhance the security posture of our customers. Today, we take the next step in that journey by making Azure Sentinel generally available.

The post Azure Sentinel—the cloud-native SIEM that empowers defenders is now generally available appeared first on Microsoft Security.

Read more