Build a privacy-resilient workplace with Microsoft Priva

Credit to Author: Pooja Parab| Date: Fri, 28 Jan 2022 17:00:00 +0000

Today, we celebrate international Data Privacy Day, which reminds us of the importance of respecting privacy, and enabling trust. Read the blog post to see how Microsoft Priva can help.

The post Build a privacy-resilient workplace with Microsoft Priva appeared first on Microsoft Security Blog.

Read more

Measure the effectiveness of your Microsoft security with AttackIQ

Credit to Author: Emma Jones| Date: Thu, 27 Jan 2022 18:00:00 +0000

Microsoft and AttackIQ are working together to automate testing using MITRE ATT&CK and a threat-informed defense. AttackIQ is a part of the Microsoft Intelligent Security Association.

The post Measure the effectiveness of your Microsoft security with AttackIQ appeared first on Microsoft Security Blog.

Read more

Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 26 Jan 2022 17:00:00 +0000

We uncovered a large-scale, multi-phase campaign that adds a novel technique to traditional phishing tactics by joining an attacker-operated device to an organization’s network to further propagate the campaign.

The post Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA appeared first on Microsoft Security Blog.

Read more

Celebrating 20 Years of Trustworthy Computing

Credit to Author: Lauren Goodwin| Date: Fri, 21 Jan 2022 17:00:00 +0000

20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. The initiative was intended to put customer security, and ultimately customer trust, at the forefront for all Microsoft employees.

The post Celebrating 20 Years of Trustworthy Computing appeared first on Microsoft Security Blog.

Read more

Destructive malware targeting Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Sun, 16 Jan 2022 02:28:30 +0000

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine.

The post Destructive malware targeting Ukrainian organizations appeared first on Microsoft Security Blog.

Read more

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Credit to Author: Eric Avena| Date: Tue, 17 Mar 2020 16:00:49 +0000

Secured-core PCs combine virtualization, operating system, and hardware and firmware protection. Along with Microsoft Defender ATP, Secured-core PCs provide end-to-end protection against advanced attacks that leverage driver vulnerabilities to gain kernel privileges.

The post Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks appeared first on Microsoft Security.

Read more

Work remotely, stay secure—guidance for CISOs

Credit to Author: Todd VanderArk| Date: Thu, 12 Mar 2020 16:00:48 +0000

With many employees suddenly working from home, there are things an organization and employees can do to help remain productive without increasing cybersecurity risk.

The post Work remotely, stay secure—guidance for CISOs appeared first on Microsoft Security.

Read more