​​Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Credit to Author: Rob Lefferts| Date: Wed, 25 Sep 2024 19:00:00 +0000

Gartner® names Microsoft a Leader in Endpoint Protection Platforms—a reflection, we believe, of our continued progress in helping organizations protect their endpoints against even the most sophisticated attacks, while driving continued efficiency for security operations center teams.

The post ​​Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms appeared first on Microsoft Security Blog.

Read more

Activate your data responsibly in the era of AI with Microsoft Purview

Credit to Author: Rudra Mitra| Date: Wed, 25 Sep 2024 16:00:00 +0000

We are announcing preview for Microsoft Purview Information Protection to restrict content in Microsoft Fabric with sensitivity labels and Microsoft Purview Data Loss Prevention policies for lakehouses, and spotlighting our recent general availability of Microsoft Purview Data Governance solution.

The post Activate your data responsibly in the era of AI with Microsoft Purview appeared first on Microsoft Security Blog.

Read more

Microsoft Trustworthy AI: Unlocking human potential starts with trust   

Credit to Author: Takeshi Numoto| Date: Tue, 24 Sep 2024 14:00:00 +0000

At Microsoft, we have commitments to ensuring Trustworthy AI and are building industry-leading supporting technology. Our commitments and capabilities go hand in hand to make sure our customers and developers are protected at every layer. Building on our commitments, today we are announcing new product capabilities to strengthen the security, safety and privacy of AI systems. 

The post Microsoft Trustworthy AI: Unlocking human potential starts with trust    appeared first on Microsoft Security Blog.

Read more

​​Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI)

Credit to Author: Charlie Bell| Date: Mon, 23 Sep 2024 15:00:00 +0000

Since the Secure Future Initiative (SFI) began, we’ve dedicated the equivalent of 34,000 full-time engineers to SFI—making it the largest cybersecurity engineering effort in history. And now, we’re sharing key updates and milestones from the first SFI Progress Report.  

The post ​​Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI) appeared first on Microsoft Security Blog.

Read more

How comprehensive security simplifies the defense of your digital estate

Credit to Author: Vasu Jakkal| Date: Wed, 18 Sep 2024 16:00:00 +0000

End-to-end security is a modern, comprehensive approach to data protection that aligns data protection and incident response across devices, systems, and users. Read the blog post to explore why it’s an attractive option for organizations committed to strengthening their cybersecurity.

The post How comprehensive security simplifies the defense of your digital estate appeared first on Microsoft Security Blog.

Read more

North Korean threat actor Citrine Sleet exploiting Chromium zero-day

Credit to Author: Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC)| Date: Fri, 30 Aug 2024 16:00:00 +0000

Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain.

The post North Korean threat actor Citrine Sleet exploiting Chromium zero-day appeared first on Microsoft Security Blog.

Read more

Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 28 Aug 2024 15:00:00 +0000

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. Tickler has been used in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the United States and the United Arab […]

The post Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations appeared first on Microsoft Security Blog.

Read more

How Microsoft Entra ID supports US government agencies in meeting identity security requirements

Credit to Author: Joy Chik| Date: Mon, 26 Aug 2024 16:00:00 +0000

United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce operational complexity, and improve control and visibility across all users.

The post How Microsoft Entra ID supports US government agencies in meeting identity security requirements appeared first on Microsoft Security Blog.

Read more