Tag: Microsoft Security Blog

Why diversity is important for a strong cybersecurity team

This article has been indexed from Microsoft Security Blog LinkedIn Chief Information Security Officer Geoff Belknap talks with Microsoft’s Bret Arsenault about recruiting cybersecurity talent and solving the skills gap. The post Why diversity is important for a strong cybersecurity…

3 steps to prevent and recover from ransomware

This article has been indexed from Microsoft Security Blog Learn real-world steps for protecting against the latest ransomware and other malicious cyberattacks. The post 3 steps to prevent and recover from ransomware appeared first on Microsoft Security Blog. Read the…

A deep-dive into the SolarWinds Serv-U SSH vulnerability

This article has been indexed from Microsoft Security Blog We’re sharing technical information about the vulnerability tracked as CVE-2021-35211, which was used to attack the SolarWinds Serv-U FTP software in limited and targeted attacks. The post A deep-dive into the…

How to proactively defend against Mozi IoT botnet

This article has been indexed from Microsoft Security Blog Mozi is a peer-to-peer (P2P) botnet that uses a BitTorrent-like network to infect IoT devices such as network gateways and digital video records (DVRs). It works by exploiting weak telnet passwords1…

Automating security assessments using Cloud Katana

This article has been indexed from Microsoft Security Blog Today, we are open-sourcing Cloud Katana, a cloud-native tool under development, to automate simulation steps on-demand in multi-cloud and hybrid cloud environments. This tool is an event-driven, serverless compute application built…

Migrating content from traditional SIEMs to Azure Sentinel

This article has been indexed from Microsoft Security Blog Get tips on migrating data and detections from your on-premises SIEM to Azure Sentinel, including how to streamline tasks using automation. The post Migrating content from traditional SIEMs to Azure Sentinel…

7 ways to harden your environment against compromise

This article has been indexed from Microsoft Security Blog Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disruptive security incidents to restore trust in identity systems and remove adversary control. During…

How security can keep media and sources safe

This article has been indexed from Microsoft Security Blog In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Runa Sandvik, an expert on journalistic security and the former Senior Director of Information…

Attack AI systems in Machine Learning Evasion Competition

This article has been indexed from Microsoft Security Blog Today, we are launching MLSEC.IO, a new machine learning security evasion competition as an educational effort for the AI and security communities to exercise their muscle to attack critical AI systems…

How to protect your CAD data files with MIP and HALOCAD

This article has been indexed from Microsoft Security Blog SECUDE has integrated their HALOCAD solution with Microsoft Information Protection SDK which extends the data protection beyond the organization’s IT perimeter. The post How to protect your CAD data files with…

A guide to balancing external threats and insider risk

This article has been indexed from Microsoft Security Blog Rockwell Automation Vice President and Chief Information Security Officer Dawn Cappelli talks about assessing, measuring, and protecting against insider risk. The post A guide to balancing external threats and insider risk…

How to build a privacy program the right way

This article has been indexed from Microsoft Security Blog Asana Privacy Counsel Whitney Merrill, an expert on privacy legal issues, talks with Microsoft about best practices for building a privacy program. The post How to build a privacy program the…

Accessibility and usability for all in Azure Sentinel

This article has been indexed from Microsoft Security Blog Designing with accessibility in mind greatly expands the impact of Microsoft solutions. However, the impact of accessible design is even bigger than that. When we design for accessibility, everyone benefits. The…

The critical role of Zero Trust in securing our world

This article has been indexed from Microsoft Security Blog US Executive Order on Cybersecurity delivers valuable guidance for both public and private organizations to make the world safer for all. The post The critical role of Zero Trust in securing…

Encouraging women to embrace their cybersecurity superpowers

This article has been indexed from Microsoft Security Blog The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around…

Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19

This article has been indexed from Microsoft Security Blog Microsoft Chief Information Security Officer Bret Arsenault discusses Microsoft’s response to COVID-19 and the new cybersecurity threats that have emerged. The post Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19 appeared…