Why you should practice rollbacks to prevent data loss in a ransomware attack

Credit to Author: Christine Barrett| Date: Thu, 27 Apr 2023 16:00:00 +0000

Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, shares insights on application security and offers strategies to protect against data loss from ransomware attacks.

The post Why you should practice rollbacks to prevent data loss in a ransomware attack appeared first on Microsoft Security Blog.

Read more

Healthy security habits to fight credential breaches: Cyberattack Series

Credit to Author: Christine Barrett| Date: Wed, 26 Apr 2023 16:00:00 +0000

This is the second in an ongoing series exploring some of the most notable cases of the Microsoft Incident Response Team. In this story, we’ll explore how organizations can adopt a defense-in-depth security posture to help protect against credential breaches and ransomware attacks.

The post Healthy security habits to fight credential breaches: Cyberattack Series appeared first on Microsoft Security Blog.

Read more

Microsoft announces the 2023 Microsoft Security Excellence Awards winners

Credit to Author: Christine Barrett| Date: Tue, 25 Apr 2023 16:00:00 +0000

At the fourth annual Microsoft Security Excellence Awards, we recognized outstanding contributions from Microsoft Intelligent Security Association (MISA) members and celebrated the next generation of security defenders. See all the finalists and winners.

The post Microsoft announces the 2023 Microsoft Security Excellence Awards winners appeared first on Microsoft Security Blog.

Read more

Getting started with the CDMC framework—Microsoft’s guide to cloud data management

Credit to Author: Christine Barrett| Date: Mon, 24 Apr 2023 16:00:00 +0000

Learn how Cloud Data Management Capabilities (CDMC) certification can build trust with your customers and provide a standard for data governance and controls for managing sensitive data at scale.

The post Getting started with the CDMC framework—Microsoft’s guide to cloud data management appeared first on Microsoft Security Blog.

Read more

Microsoft Entra delivers 240 percent ROI, according to new Forrester study

Credit to Author: Matt Thomas| Date: Thu, 20 Apr 2023 16:00:00 +0000

Learn why Microsoft Entra delivers 240-percent ROI—get key benefits and real-world learnings from adopters across the financial, high-tech, and manufacturing sectors.

The post Microsoft Entra delivers 240 percent ROI, according to new Forrester study appeared first on Microsoft Security Blog.

Read more

Simplified endpoint management with Microsoft Intune Suite: Adopting a long-term approach with intelligence and automation

Credit to Author: Christine Barrett| Date: Wed, 19 Apr 2023 16:00:00 +0000

Do you feel like your endpoint management set-up is too complex? This step-by-step guide will help you create a vision and set you on the path to simpler endpoint management.

The post Simplified endpoint management with Microsoft Intune Suite: Adopting a long-term approach with intelligence and automation appeared first on Microsoft Security Blog.

Read more

Microsoft shifts to a new threat actor naming taxonomy

Credit to Author: Microsoft Security Threat Intelligence – Editor| Date: Tue, 18 Apr 2023 15:00:00 +0000

Microsoft is excited to announce that we are shifting to a new threat actor naming taxonomy aligned to the theme of weather. The complexity, scale, and volume of threats is increasing, driving the need to reimagine not only how Microsoft talks about threats but also how we enable customers to understand those threats quickly and with clarity.

The post Microsoft shifts to a new threat actor naming taxonomy appeared first on Microsoft Security Blog.

Read more

Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets

Credit to Author: Microsoft Security Threat Intelligence| Date: Tue, 18 Apr 2023 15:00:00 +0000

Today, Microsoft is reporting on a distinct subset of Mint Sandstorm (formerly known as PHOSPHORUS), an Iranian threat actor that specializes in hacking into and stealing sensitive information from high-value targets. This subset is technically and operationally mature, capable of developing bespoke tooling and quickly weaponizing recently disclosed vulnerabilities.

The post Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets appeared first on Microsoft Security Blog.

Read more

Protect intellectual property with Govern 365 and Microsoft Purview

Credit to Author: Christine Barrett| Date: Mon, 17 Apr 2023 17:00:00 +0000

Learn how to secure sensitive information within your global supply chain with Netwoven Govern 365 and Microsoft Purview Information Protection.

The post Protect intellectual property with Govern 365 and Microsoft Purview appeared first on Microsoft Security Blog.

Read more