Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals

Credit to Author: Todd VanderArk| Date: Thu, 20 Feb 2020 14:00:43 +0000

Azure Sentinel Fusion technology uses powerful machine learning methods to enable your SecOps team to focus on the threats that matter.

The post Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals appeared first on Microsoft Security.

Read more

Unifying security policy across all mobile form-factors with Wandera and Microsoft

Credit to Author: Todd VanderArk| Date: Wed, 19 Feb 2020 17:00:17 +0000

The way we work is evolving. Technology enables more effective employees by helping them to be productive where and when they choose. Businesses also enjoy the productivity benefits of a connected workforce.

The post Unifying security policy across all mobile form-factors with Wandera and Microsoft appeared first on Microsoft Security.

Read more

Mattress Firm deployed Azure Active Directory to securely connect Firstline Workers to their SaaS apps and to each other

Credit to Author: Todd VanderArk| Date: Thu, 13 Feb 2020 17:00:02 +0000

A connected workforce is fundamental to business. Learn how Azure AD protects Mattress Firm employees’ identities across the business.

The post Mattress Firm deployed Azure Active Directory to securely connect Firstline Workers to their SaaS apps and to each other appeared first on Microsoft Security.

Read more

Visionary security partners to be honored at the very first Microsoft Security 20/20 event

Credit to Author: Todd VanderArk| Date: Thu, 06 Feb 2020 17:00:13 +0000

Microsoft Security 20/20 will put the spotlight on companies and individuals with a clear-eyed view of the security challenges we face and smart integrated solutions to help solve them.

The post Visionary security partners to be honored at the very first Microsoft Security 20/20 event appeared first on Microsoft Security.

Read more

Guarding against supply chain attacks—Part 2: Hardware risks

Credit to Author: Todd VanderArk| Date: Mon, 03 Feb 2020 17:00:30 +0000

Part 2 examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft’s role in reducing hardware-based attacks.

The post Guarding against supply chain attacks—Part 2: Hardware risks appeared first on Microsoft Security.

Read more

Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure

Credit to Author: Todd VanderArk| Date: Thu, 23 Jan 2020 17:00:39 +0000

Azure Security Benchmark offers a collection of over 90 security best practices and recommendations you can employ to increase the overall security and compliance of all your workloads in Azure.

The post Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure appeared first on Microsoft Security.

Read more

How companies can prepare for a heightened threat environment

Credit to Author: Todd VanderArk| Date: Mon, 20 Jan 2020 17:00:31 +0000

Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk.

The post How companies can prepare for a heightened threat environment appeared first on Microsoft Security.

Read more

Threat hunting in Azure Advanced Threat Protection (ATP)

Credit to Author: Todd VanderArk| Date: Tue, 07 Jan 2020 17:00:53 +0000

DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Luckily, this customer had deployed Azure ATP prior to the incident and it had already normalized authentication and identity transactions within the customer network.

The post Threat hunting in Azure Advanced Threat Protection (ATP) appeared first on Microsoft Security.

Read more

How to secure your IoT deployment during the security talent shortage

Credit to Author: Todd VanderArk| Date: Tue, 17 Dec 2019 17:00:41 +0000

It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros. But there is a way to augment existing security teams and resources.

The post How to secure your IoT deployment during the security talent shortage appeared first on Microsoft Security.

Read more