Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more

Microsoft Insider Risk Management and Communication Compliance in Microsoft 365 now generally available

Credit to Author: Todd VanderArk| Date: Thu, 20 Feb 2020 14:05:57 +0000

Microsoft Insider Risk Management and Communication Compliance in Microsoft 365 help organizations address internal risks—such as IP theft or code of conduct policy violations.

The post Microsoft Insider Risk Management and Communication Compliance in Microsoft 365 now generally available appeared first on Microsoft Security.

Read more

Building on secure productivity

Credit to Author: Todd VanderArk| Date: Wed, 12 Feb 2020 17:00:08 +0000

Announcing Safe Documents and Application Guard, new Microsoft 365 features that bring together Windows 10, Office 365, and Microsoft Defender ATP to help users stay secure and productive.

The post Building on secure productivity appeared first on Microsoft Security.

Read more

Visionary security partners to be honored at the very first Microsoft Security 20/20 event

Credit to Author: Todd VanderArk| Date: Thu, 06 Feb 2020 17:00:13 +0000

Microsoft Security 20/20 will put the spotlight on companies and individuals with a clear-eyed view of the security challenges we face and smart integrated solutions to help solve them.

The post Visionary security partners to be honored at the very first Microsoft Security 20/20 event appeared first on Microsoft Security.

Read more

How companies can prepare for a heightened threat environment

Credit to Author: Todd VanderArk| Date: Mon, 20 Jan 2020 17:00:31 +0000

Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk.

The post How companies can prepare for a heightened threat environment appeared first on Microsoft Security.

Read more