Windows 11: Should you bypass the hardware block?

Credit to Author: Susan Bradley| Date: Tue, 31 May 2022 12:55:00 -0700

If you’re like most PC users, your current computer can’t run Windows 11. Microsoft has placed a line in the hardware sand to ensure that only modern machines with certain specifications that harden security can run Windows 11. 

Well, sort of. The company provides a workaround, as I’ll discuss in a moment. Whether you should take advantage of this loophole to upgrade PCs (whether yours or your users’) to Windows 11 is the question.

First, if you want to know if a computer can run Windows 11, you can use the PC Health Check app, Microsoft’s diagnostic tool. But if your PC doesn’t support Windows 11, Microsoft’s app doesn’t do a great job of explaining why. Instead, I recommend using either the Windows 11 Requirements Check Tool from ByteJams.com or WhyNotWin11, available on Github. Both tools provide granular detail about why a machine won’t run Windows 11. On my personal laptop at home, for instance, the processor can’t support hardware for hypervisor enforced code integrity, nor does Windows 11 like the graphics display.

To read this article in full, please click here

Read more

New security features for Windows 11 will help protect hybrid work

Credit to Author: Christine Barrett| Date: Tue, 05 Apr 2022 15:00:00 +0000

Attackers haven’t wasted any time capitalizing on the rapid move to hybrid work. Every day cyber criminals and nation states alike have improved their targeting, speed and accuracy as the world adapted to working outside the office.

The post New security features for Windows 11 will help protect hybrid work appeared first on Microsoft Security Blog.

Read more

Guarding against supply chain attacks—Part 3: How software becomes compromised

Credit to Author: Todd VanderArk| Date: Wed, 11 Mar 2020 16:00:32 +0000

Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.

The post Guarding against supply chain attacks—Part 3: How software becomes compromised appeared first on Microsoft Security.

Read more

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Credit to Author: Eric Avena| Date: Wed, 18 Dec 2019 18:00:24 +0000

Microsoft Defender ATP data scientists and threat hunters collaborate to use a data science-driven approach to detecting RDP brute force attacks to protect customers against real-world threats.

The post Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks appeared first on Microsoft Security.

Read more

Go passwordless to strengthen security and reduce costs

Credit to Author: Todd VanderArk| Date: Thu, 12 Dec 2019 00:00:56 +0000

Joy Chik, Microsoft CVP, Identity, explains how passwordless works and provides steps to begin preparing your organization to eliminate passwords.

The post Go passwordless to strengthen security and reduce costs appeared first on Microsoft Security.

Read more

Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise

Credit to Author: Eric Avena| Date: Mon, 28 Oct 2019 15:00:10 +0000

Experts on demand is now generally available and gives customers direct access to real-life Microsoft threat analysts to help with their security investigations.

The post Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise appeared first on Microsoft Security.

Read more

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Credit to Author: Eric Avena| Date: Mon, 21 Oct 2019 15:00:56 +0000

We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.

The post Microsoft and partners design new device security requirements to protect against targeted firmware attacks appeared first on Microsoft Security.

Read more

Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Credit to Author: Eric Avena| Date: Tue, 01 Oct 2019 17:30:05 +0000

Microsoft is positioned as a leader in The Forrester Wave™: Endpoint Security Suites, Q3 2019, receiving among the second highest scores in both the strategy and market presence categories.

The post Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave appeared first on Microsoft Security.

Read more