Get the most out of Microsoft Copilot for Security with good prompt engineering

Credit to Author: Rod Trent| Date: Wed, 21 Feb 2024 17:00:00 +0000

Good prompt engineering can greatly improve generative AI outputs, which means more relevant and accurate results. Microsoft Copilot for Security includes featured prompts as well as promptbooks to help security teams better investigate, manage, and respond to cyberthreats.

The post Get the most out of Microsoft Copilot for Security with good prompt engineering appeared first on Microsoft Security Blog.

Read more

Navigating NIS2 requirements with Microsoft Security solutions

Credit to Author: Herain Oberoi| Date: Tue, 20 Feb 2024 17:00:00 +0000

​​NIS2 is the most comprehensive European cybersecurity directive yet, covering 18 sectors and 160,000+ companies. The Zero Trust principles addressed by Microsoft Security solutions can help you protect your organization and meet NIS2 requirements.

The post Navigating NIS2 requirements with Microsoft Security solutions appeared first on Microsoft Security Blog.

Read more

Staying ahead of threat actors in the age of AI

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 14 Feb 2024 12:00:00 +0000

Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity includes prompt-injections, attempted misuse of large language models (LLM), and fraud.

The post Staying ahead of threat actors in the age of AI appeared first on Microsoft Security Blog.

Read more

Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI

Credit to Author: Vasu Jakkal| Date: Wed, 14 Feb 2024 12:00:00 +0000

Today we released the sixth edition of Cyber Signals, spotlighting the remarkable interest and impact driven by AI on the cybersecurity landscape. This includes new, joint threat intelligence Microsoft is sharing with our OpenAI partners, detailing how we are protecting AI platforms from attempted abuse by threat actors.

The post Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI appeared first on Microsoft Security Blog.

Read more

Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team

Credit to Author: Andrew Conway| Date: Thu, 08 Feb 2024 17:00:00 +0000

Microsoft Copilot for Security provides tangible applications to the Defender Experts’ daily work—including building incident narratives, analyzing threats, time-saving tips, upskilling, and more.

The post Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team appeared first on Microsoft Security Blog.

Read more

Connect with Microsoft at these cybersecurity events in 2024

Credit to Author: Benjamin Lim| Date: Thu, 01 Feb 2024 18:00:00 +0000

Cybersecurity professionals, business decision makers, and developers involved in cybersecurity have many industry events to choose from. But with all the possibilities, they may be unsure of which one is right for them. Read on for recommendations based on your role.

The post Connect with Microsoft at these cybersecurity events in 2024 appeared first on Microsoft Security Blog.

Read more

3 new ways the Microsoft Intune Suite offers security, simplification, and savings

Credit to Author: Michael Wallent and Dilip Radhakrishnan| Date: Thu, 01 Feb 2024 17:00:00 +0000

The main components of the Microsoft Intune Suite are now generally available. Read about how consolidated endpoint management adds value and functionality for security teams.

The post 3 new ways the Microsoft Intune Suite offers security, simplification, and savings appeared first on Microsoft Security Blog.

Read more

Join us at InfoSec Jupyterthon 2024

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 29 Jan 2024 18:00:00 +0000

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]

The post Join us at InfoSec Jupyterthon 2024 appeared first on Microsoft Security Blog.

Read more

Best practices in moving to cloud native endpoint management

Credit to Author: Jason Roszak| Date: Mon, 29 Jan 2024 17:00:00 +0000

This blog is the second of three that details our recommendation to adopt cloud native device management. Understand the lessons from various Intune customers in their journeys and how they achieved greater security, cost savings, and readiness for the future through their cloud transformations.

The post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog.

Read more