Microsoft best practices for managing IoT security concerns

Credit to Author: Christine Barrett| Date: Mon, 25 Apr 2022 16:00:00 +0000

The Internet of Things, or IoT, has expanded beyond the mere concept that it was when first introduced. IoT is now part of most individuals’ daily activities, from smart speakers and thermostats to smartwatches and vehicles. IoT devices and systems bring massive convenience and functionality. However, due to the complicated nature of IoT, when implementing and managing IoT, security must be top of mind.

The post Microsoft best practices for managing IoT security concerns appeared first on Microsoft Security Blog.

Read more

Discover the anatomy of an external cyberattack surface with new RiskIQ report

Credit to Author: Christine Barrett| Date: Thu, 21 Apr 2022 16:00:00 +0000

Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise.

The post Discover the anatomy of an external cyberattack surface with new RiskIQ report appeared first on Microsoft Security Blog.

Read more

The future of compliance and data governance is here: Introducing Microsoft Purview

Credit to Author: Emma Jones| Date: Tue, 19 Apr 2022 17:00:00 +0000

Hybrid work has connected us in ways unimaginable just two years ago. Today we routinely communicate across continents while collaborating in real-time. Protecting a decentralized hybrid work environment requires strong solutions built around clear principles designed to defend customers’ data, safeguard employees, and protect the business.

The post The future of compliance and data governance is here: Introducing Microsoft Purview appeared first on Microsoft Security Blog.

Read more

A clearer lens on Zero Trust security strategy: Part 1

Credit to Author: Christine Barrett| Date: Thu, 14 Apr 2022 18:00:00 +0000

Today’s world is flooded with definitions and perspectives on Zero Trust, so we are kicking off a blog series to bring clarity to what Zero Trust is and means. This first blog will draw on the past, present, and future to bring a clear vision while keeping our feet planted firmly on the ground of reality.

The post A clearer lens on Zero Trust security strategy: Part 1 appeared first on Microsoft Security Blog.

Read more

Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware

Credit to Author: Paul Oliveria| Date: Wed, 13 Apr 2022 16:00:00 +0000

Microsoft took action against the ZLoader trojan by working with telecommunications providers around the world to disrupt key ZLoader infrastructure. In this blog, we detail the various characteristics for identifying ZLoader activity, including its associated tactics, recent campaigns, and affiliated payloads, such as ransomware.

The post Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware appeared first on Microsoft Security Blog.

Read more

Tarrask malware uses scheduled tasks for defense evasion

Credit to Author: Paul Oliveria| Date: Tue, 12 Apr 2022 16:00:00 +0000

Microsoft Detection and Response Team (DART) researchers have uncovered malware that creates “hidden” scheduled tasks as a defense evasion technique. In this post, we will demonstrate how threat actors create scheduled tasks, how they cover their tracks, and how the malware’s evasion techniques are used to maintain and ensure persistence on systems.

The post Tarrask malware uses scheduled tasks for defense evasion appeared first on Microsoft Security Blog.

Read more

Learn the latest cybersecurity techniques at the Microsoft Security Summit

Credit to Author: Christine Barrett| Date: Mon, 11 Apr 2022 16:00:00 +0000

On May 12, 2022, at the Microsoft Security Summit digital event, join other cybersecurity professionals in exploring how a comprehensive approach to security can empower organizations to innovate fearlessly—even in the face of evolving cyberthreats.

The post Learn the latest cybersecurity techniques at the Microsoft Security Summit appeared first on Microsoft Security Blog.

Read more

Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report

Credit to Author: Christine Barrett| Date: Wed, 06 Apr 2022 17:00:00 +0000

Microsoft was named as a Leader in The Forrester Wave™: Enterprise Detection and Response for Q1 of 2022—the ninth Leader position for Microsoft Security in a Forrester Wave™.

The post Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report appeared first on Microsoft Security Blog.

Read more

Microsoft 365 Defender demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations

Credit to Author: Katie McCafferty| Date: Wed, 06 Apr 2022 01:30:07 +0000

For the fourth consecutive year, Microsoft 365 Defender demonstrated industry-leading protection in MITRE Engenuity’s independent ATT&CK® Enterprise Evaluations. These results highlighted the importance of taking an XDR-based approach spanning endpoints, identities, email and cloud, and the importance of both prevention and protection.

The post Microsoft 365 Defender demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations appeared first on Microsoft Security Blog.

Read more

New security features for Windows 11 will help protect hybrid work

Credit to Author: Christine Barrett| Date: Tue, 05 Apr 2022 15:00:00 +0000

Attackers haven’t wasted any time capitalizing on the rapid move to hybrid work. Every day cyber criminals and nation states alike have improved their targeting, speed and accuracy as the world adapted to working outside the office.

The post New security features for Windows 11 will help protect hybrid work appeared first on Microsoft Security Blog.

Read more