Best practices for adding layered security to Azure security with Check Point’s CloudGuard IaaS

Credit to Author: Todd VanderArk| Date: Fri, 18 Oct 2019 01:00:03 +0000

Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices.

The post Best practices for adding layered security to Azure security with Check Point’s CloudGuard IaaS appeared first on Microsoft Security.

Read more

Microsoft’s 4 principles for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principles for an effective security operations center appeared first on Microsoft Security.

Read more

Top 6 email security best practices to protect against phishing attacks and business email compromise

Credit to Author: Eric Avena| Date: Wed, 16 Oct 2019 17:00:11 +0000

What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.

The post Top 6 email security best practices to protect against phishing attacks and business email compromise appeared first on Microsoft Security.

Read more

Microsoft’s 4 principals for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principals for an effective security operations center appeared first on Microsoft Security.

Read more

Patching as a social responsibility

Credit to Author: Todd VanderArk| Date: Wed, 09 Oct 2019 16:00:59 +0000

To plan, implement, and improve an enterprise patch management strategy, Microsoft is partnering with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE). Learn how you can also help.

The post Patching as a social responsibility appeared first on Microsoft Security.

Read more

How to avoid getting caught in a “Groundhog Day” loop of security issues

Credit to Author: Todd VanderArk| Date: Tue, 08 Oct 2019 16:00:58 +0000

One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.

The post How to avoid getting caught in a “Groundhog Day” loop of security issues appeared first on Microsoft Security.

Read more

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Credit to Author: Eric Avena| Date: Tue, 08 Oct 2019 15:00:11 +0000

Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.

The post In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks appeared first on Microsoft Security.

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

Credit to Author: Todd VanderArk| Date: Mon, 07 Oct 2019 21:20:56 +0000

In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.

The post CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools appeared first on Microsoft Security.

Read more