Empower Firstline Workers with Azure AD and YubiKey passwordless authentication

Credit to Author: Todd VanderArk| Date: Thu, 12 Mar 2020 16:00:37 +0000

The integration of FIDO2-based YubiKeys and Azure Active Directory (Azure AD) is a game changer.

The post Empower Firstline Workers with Azure AD and YubiKey passwordless authentication appeared first on Microsoft Security.

Read more

Guarding against supply chain attacks—Part 3: How software becomes compromised

Credit to Author: Todd VanderArk| Date: Wed, 11 Mar 2020 16:00:32 +0000

Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.

The post Guarding against supply chain attacks—Part 3: How software becomes compromised appeared first on Microsoft Security.

Read more

Behavioral blocking and containment: Transforming optics into protection

Credit to Author: Eric Avena| Date: Mon, 09 Mar 2020 16:30:20 +0000

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.

The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security.

Read more

Real-life cybercrime stories from DART, the Microsoft Detection and Response Team

Credit to Author: Todd VanderArk| Date: Mon, 09 Mar 2020 16:00:23 +0000

In the new DART Case Reports, you’ll find unique stories from our team’s engagements around the globe. Read the first in the series today.

The post Real-life cybercrime stories from DART, the Microsoft Detection and Response Team appeared first on Microsoft Security.

Read more

Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more

Quick wins—single sign-on (SSO) and Multi-Factor Authentication (MFA)

Credit to Author: Todd VanderArk| Date: Tue, 03 Mar 2020 17:00:09 +0000

Organizations should consider a Cloud Identity as a Service (IDaaS), and MFA solution, like Azure Active Directory (Azure AD) for effective countermeasures against modern threats.

The post Quick wins—single sign-on (SSO) and Multi-Factor Authentication (MFA) appeared first on Microsoft Security.

Read more

Microsoft identity acronyms—what do they mean and how do they relate to each other?

Credit to Author: Todd VanderArk| Date: Mon, 02 Mar 2020 17:00:54 +0000

This is the first in a blog series to help lessen confusion around identity by sharing with you some of the terms used at Microsoft.

The post Microsoft identity acronyms—what do they mean and how do they relate to each other? appeared first on Microsoft Security.

Read more