Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. Learn more about why organizations across major industries rely on it.…
Category: Microsoft Security Blog
New Microsoft guidance for the CISA Zero Trust Maturity Model
New Microsoft guidance is now available for United States government agencies and their industry partners to help implement Zero Trust strategies and meet CISA Zero Trust requirements. The post New Microsoft guidance for the CISA Zero Trust Maturity Model appeared…
Microsoft Defender for Cloud named a Leader in Frost Radar™ for CNAPP for the second year in a row!
In the ever-evolving landscape of cloud security, Microsoft continues to assert its dominance with its comprehensive and innovative solutions. The Frost Radar™: Cloud-Native Application Protection Platforms, 2024 report underscores Microsoft’s leadership in both – the innovation and growth index, highlighting…
Foundry study highlights the benefits of a unified security platform in new e-book
Microsoft commissioned Foundry to conduct a study to understand the current state of threat protection. Read the new e-book for research-driven insights into a unified security platform. The post Foundry study highlights the benefits of a unified security platform in…
Agile Business, agile security: How AI and Zero Trust work together
We recently published a new whitepaper that examines the security challenges and opportunities from generative AI. The post Agile Business, agile security: How AI and Zero Trust work together appeared first on Microsoft Security Blog. This article has been indexed…
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
Passkeys offer faster, safer sign-ins than passwords. Microsoft encourages users to adopt passkeys for improved security and convenience. The post Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security appeared first on…
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise
For the sixth year in a row, Microsoft Defender XDR demonstrated industry-leading extended detection and response (XDR) capabilities in the independent MITRE ATT&CK® Evaluations: Enterprise. The cyberattack used during the detection test highlights the importance of a unified XDR platform…
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and KazuarV2. The post Frequent freeloader part II: Russian actor Secret Blizzard…
New Microsoft Purview features help protect and govern your data in the era of AI
Microsoft Purview delivers unified data security, governance, and compliance for the era of AI. Read about the new features. The post New Microsoft Purview features help protect and govern your data in the era of AI appeared first on Microsoft…
8 years as a Leader in the Gartner® Magic Quadrant™ for Access Management
For the 8th year in a row, Microsoft is designated a Leader in Gartner® Magic Quadrant™ for Access Management for our Microsoft Entra ID products and related solutions. The post 8 years as a Leader in the Gartner® Magic…
Why security leaders trust Microsoft Sentinel to modernize their SOC
Microsoft Sentinel transforms security operations centers with cloud-native SIEM capabilities, AI-powered threat detection, and cost-effective scalability to protect your entire digital ecosystem. The post Why security leaders trust Microsoft Sentinel to modernize their SOC appeared first on Microsoft Security Blog.…
Explore new Microsoft Entra capabilities at Gartner Identity & Access Management Summit 2024
Join Microsoft Security at Gartner Identity & Access Management Summit 2024 to explore identity and network access innovations and connect with experts. The post Explore new Microsoft Entra capabilities at Gartner Identity & Access Management Summit 2024 appeared first on…
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure…
Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition
AI transformation starts with security. This was a major theme across the majority of the big news and reveals from Microsoft Security at Microsoft Ignite 2024. The post Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition appeared first…
AI innovations for a more secure future unveiled at Microsoft Ignite
Company delivers advances in AI and posture management, unprecedented bug bounty program, and updates on its Secure Future Initiative. The post AI innovations for a more secure future unveiled at Microsoft Ignite appeared first on Microsoft Security Blog. This article…
Microsoft Data Security Index annual report highlights evolving generative AI security needs
84% of surveyed organizations want to feel more confident about managing and discovering data input into AI apps and tools. The post Microsoft Data Security Index annual report highlights evolving generative AI security needs appeared first on Microsoft Security Blog. This…
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
The Navy implementation scored a 100 percent success rate, meeting DoD requirements on all 91 Target-Level activities tested. The post DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration appeared first on Microsoft Security Blog.…
More value, less risk: How to implement generative AI across the organization securely and responsibly
The technology landscape is undergoing a massive transformation, and AI is at the center of this change. The post More value, less risk: How to implement generative AI across the organization securely and responsibly appeared first on Microsoft Security Blog.…
Zero Trust Workshop: Advance your knowledge with an online resource
As part of Microsoft’s ongoing efforts to support security modernization and the Zero Trust principles, we’ve launched Zero Trust Workshop, an online self-service resource. Read our latest blog post for details. The post Zero Trust Workshop: Advance your knowledge…
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks
This blog examines the impact of QR code phishing campaigns and the innovative features of Microsoft Defender for Office 365 that help combat evolving cyberthreats. The post How Microsoft Defender for Office 365 innovated to address QR code phishing attacks…