Connect with Microsoft at these cybersecurity events in 2024

Credit to Author: Benjamin Lim| Date: Thu, 01 Feb 2024 18:00:00 +0000

Cybersecurity professionals, business decision makers, and developers involved in cybersecurity have many industry events to choose from. But with all the possibilities, they may be unsure of which one is right for them. Read on for recommendations based on your role.

The post Connect with Microsoft at these cybersecurity events in 2024 appeared first on Microsoft Security Blog.

Read more

3 new ways the Microsoft Intune Suite offers security, simplification, and savings

Credit to Author: Michael Wallent and Dilip Radhakrishnan| Date: Thu, 01 Feb 2024 17:00:00 +0000

The main components of the Microsoft Intune Suite are now generally available. Read about how consolidated endpoint management adds value and functionality for security teams.

The post 3 new ways the Microsoft Intune Suite offers security, simplification, and savings appeared first on Microsoft Security Blog.

Read more

Join us at InfoSec Jupyterthon 2024

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 29 Jan 2024 18:00:00 +0000

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]

The post Join us at InfoSec Jupyterthon 2024 appeared first on Microsoft Security Blog.

Read more

Best practices in moving to cloud native endpoint management

Credit to Author: Jason Roszak| Date: Mon, 29 Jan 2024 17:00:00 +0000

This blog is the second of three that details our recommendation to adopt cloud native device management. Understand the lessons from various Intune customers in their journeys and how they achieved greater security, cost savings, and readiness for the future through their cloud transformations.

The post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog.

Read more

Midnight Blizzard: Guidance for responders on nation-state attack

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 26 Jan 2024 00:00:00 +0000

The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The Microsoft Threat Intelligence investigation identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as NOBELIUM.

The post Midnight Blizzard: Guidance for responders on nation-state attack appeared first on Microsoft Security Blog.

Read more

How Datawiza uses Microsoft Entra ID to help universities simplify access

Credit to Author: Rocky Gunderson| Date: Wed, 24 Jan 2024 17:00:00 +0000

Datawiza helps Claremont Graduate University enable Microsoft Entra ID multifactor authentication and single sign-on for Oracle PeopleSoft, streamling and improving the student experience.

The post How Datawiza uses Microsoft Entra ID to help universities simplify access appeared first on Microsoft Security Blog.

Read more

Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI

Credit to Author: Caitlin Fitzgerald| Date: Thu, 18 Jan 2024 17:00:00 +0000

Microsoft solutions can ease some of the top challenges of legal professionals. Read on for two advantages of the combination of Microsoft Purview eDiscovery and generative AI, and explore opportunities to connect with us at Legalweek.

The post Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI appeared first on Microsoft Security Blog.

Read more

New Microsoft Incident Response guides help security teams analyze suspicious activity

Credit to Author: Microsoft Incident Response| Date: Wed, 17 Jan 2024 18:00:00 +0000

Access the first two cloud investigation guides from Microsoft Incident Response to improve triage and analysis of data in Microsoft 365 and Microsoft Entra ID.

The post New Microsoft Incident Response guides help security teams analyze suspicious activity appeared first on Microsoft Security Blog.

Read more

New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 17 Jan 2024 17:00:00 +0000

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, the threat actor used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files.

The post New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs appeared first on Microsoft Security Blog.

Read more