Why strong security solutions are critical to privacy protection

Credit to Author: Emma Jones| Date: Wed, 15 Jun 2022 16:00:00 +0000

Former three-term Ontario Information and Privacy Commissioner Ann Cavoukian, Ph.D., talks about her seven foundational principles of privacy by design and the importance of data privacy.

The post Why strong security solutions are critical to privacy protection appeared first on Microsoft Security Blog.

Read more

The many lives of BlackCat ransomware

Credit to Author: Paul Oliveria| Date: Mon, 13 Jun 2022 16:00:00 +0000

The use of an unconventional programming language, multiple target devices and possible entry points, and affiliation with prolific threat activity groups have made the BlackCat ransomware a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.

The post The many lives of BlackCat ransomware appeared first on Microsoft Security Blog.

Read more

5 ways to connect with Microsoft Security at Identiverse 2022

Credit to Author: Christine Barrett| Date: Mon, 13 Jun 2022 15:00:00 +0000

Microsoft will be attending Identiverse 2022 and would love to connect with partners and others interested in identity. Here are five ways to do that.

The post 5 ways to connect with Microsoft Security at Identiverse 2022 appeared first on Microsoft Security Blog.

Read more

Announcing 2022 Microsoft Security Excellence Awards winners

Credit to Author: Emma Jones| Date: Mon, 06 Jun 2022 15:00:00 +0000

Winners of the Microsoft Security Excellence Awards were announced as Microsoft executives and MISA members gathered for the first time in more than two years.

The post Announcing 2022 Microsoft Security Excellence Awards winners appeared first on Microsoft Security Blog.

Read more

Exposing POLONIUM activity and infrastructure targeting Israeli organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 02 Jun 2022 16:00:00 +0000

Microsoft successfully detected and disabled attack activity abusing OneDrive by a previously undocumented Lebanon-based activity group Microsoft Threat Intelligence Center (MSTIC) tracks as POLONIUM.

The post Exposing POLONIUM activity and infrastructure targeting Israeli organizations appeared first on Microsoft Security Blog.

Read more

Microsoft collaborates with Tenable to support federal cybersecurity efforts

Credit to Author: Christine Barrett| Date: Thu, 02 Jun 2022 10:00:00 +0000

In the spirit of the executive order and as part of our commitment to enhancing cybersecurity across the US, we today announce that Tenable has expanded its collaboration with the Microsoft Intelligent Security Association (MISA). Together, Microsoft and Tenable will help enhance the US government’s ability to quickly identify, investigate, prioritize, and remediate threats—and help collectively raise the country’s security posture.

The post Microsoft collaborates with Tenable to support federal cybersecurity efforts appeared first on Microsoft Security Blog.

Read more

Using Python to unearth a goldmine of threat intelligence from leaked chat logs

Credit to Author: Paul Oliveria| Date: Wed, 01 Jun 2022 18:00:00 +0000

Dealing with a great amount of data can be time consuming, thus using Python can be very powerful to help analysts sort information and extract the most relevant data for their investigation. The open-source tools library, MSTICpy, for example, is a Python tool dedicated to threat intelligence. It aims to help threat analysts acquire, enrich, analyze, and visualize data.

The post Using Python to unearth a goldmine of threat intelligence from leaked chat logs appeared first on Microsoft Security Blog.

Read more

Streamlining employee onboarding: Microsoft’s response to the Great Reshuffle

Credit to Author: Emma Jones| Date: Tue, 31 May 2022 13:00:00 +0000

Verifiable credentials may help improve employee experience, an important factor HR and IT business leaders must pay attention to as expectations evolve.

The post Streamlining employee onboarding: Microsoft’s response to the Great Reshuffle appeared first on Microsoft Security Blog.

Read more

Secure access for a connected world—meet Microsoft Entra

Credit to Author: Emma Jones| Date: Tue, 31 May 2022 13:00:00 +0000

Identity is not just about directories, and access is not just about the network. Security challenges have become much broader, so we need broader solutions. We need to secure access for every customer, partner, and employee—and for every microservice, sensor, network, device, and database.

The post Secure access for a connected world—meet Microsoft Entra appeared first on Microsoft Security Blog.

Read more