cybersecurity

MicrosoftSecurity

New Windows 11 security features are designed for hybrid work

Credit to Author: Christine Barrett| Date: Tue, 20 Sep 2022 17:00:00 +0000

With Windows 11, you can protect your valuable data and enable secure hybrid work with the latest advanced security. We’re proud to announce the new security features you heard about this spring are now available.

The post New Windows 11 security features are designed for hybrid work appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Test your team’s security readiness with the Gone Phishing Tournament

Credit to Author: Christine Barrett| Date: Thu, 15 Sep 2022 16:00:00 +0000

In partnership with Microsoft, Terranova created the Gone Phishing Tournament, an online phishing initiative that uses real-world simulations to establish accurate phishing clickthrough rates and additional benchmarking statistics for user behaviors.

The post Test your team’s security readiness with the Gone Phishing Tournament appeared first on Microsoft Security Blog.

Read More
ScadaICSSchneider

How edge computing systems lower cybersecurity risk in healthcare while enhancing data access

Credit to Author: Samir El Hassanin| Date: Wed, 14 Sep 2022 13:48:20 +0000

The rapid proliferation of the internet of things (IOT) across the healthcare industry has brought along with it both unprecedented data access and analysis benefits, as well as new categories… Read more »

The post How edge computing systems lower cybersecurity risk in healthcare while enhancing data access appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

Implementing a Zero Trust strategy after compromise recovery

Credit to Author: Matt Thomas| Date: Wed, 14 Sep 2022 16:00:00 +0000

After a compromise recovery follows what we call a Security Strategic Recovery. This is the plan for moving forward to get up to date with security posture all over the environment. The plan consists of different components like securing privileged access and extended detection and response, but it all points in the same direction: moving ahead with Zero Trust Strategy over traditional network-based security.

The post Implementing a Zero Trust strategy after compromise recovery appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Secure your endpoints with Transparity and Microsoft

Credit to Author: Christine Barrett| Date: Tue, 13 Sep 2022 16:00:00 +0000

When it comes to cybersecurity, the ability to normalize and correlate disparate logs from different devices, appliances, and resources is key, as is the ability to react quickly when under attack. In this blog post, we explore the importance of EPP as an essential component in your security strategy.

The post Secure your endpoints with Transparity and Microsoft appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

The art and science behind Microsoft threat hunting: Part 1

Credit to Author: Christine Barrett| Date: Thu, 08 Sep 2022 16:00:00 +0000

At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. This involves looking beyond the known alerts or malicious threats to discover new potential threats and vulnerabilities.

The post The art and science behind Microsoft threat hunting: Part 1 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft investigates Iranian attacks against the Albanian government

Credit to Author: Paul Oliveria| Date: Thu, 08 Sep 2022 15:00:00 +0000

Shortly after the destructive cyberattacks on the Albanian government in mid-July, the Microsoft Detection and Response Team (DART) was engaged to lead an investigation into the attacks.

The post Microsoft investigates Iranian attacks against the Albanian government appeared first on Microsoft Security Blog.

Read More