Security

Technical articles from Microsoft’s official blogs of in-depth discussions of security, cybersecurity and technology trends affecting trust in computing. This includes timely security news, trends, and best practices.

Upcoming Content Hub AMA supported Data Connectors

Hello Sentinel community! Today we are happy to share that new data connectors with AMA support will soon be available in Sentinel’s Content Hub. What’s coming: For data sources that currently use the MMA agent, new connectors supporting AMA will be available in the Microsoft Sentinel Content Hub. These connectors will leverage DCRs for log […]

Upcoming Content Hub AMA supported Data Connectors Continue Reading

Microsoft Entra Verified ID introduces Face Check in preview

Today, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include Face Check—a privacy-respecting facial matching feature for high-assurance verifications, which is now in preview. Watch the video to learn more and read on for how you can get started today. Try Face Check for yourself. Verified ID: Verify once, use everywhere In

Microsoft Entra Verified ID introduces Face Check in preview Continue Reading

Connect with Microsoft at these cybersecurity events in 2024

In the cybersecurity industry, there are many events to choose from. You as a cybersecurity professional are left wondering which events are worth your time. Each year, Microsoft hosts and participates in numerous events focused on equipping security professionals of all levels with the knowledge, skills, and tools you need to elevate your cybersecurity approach

Connect with Microsoft at these cybersecurity events in 2024 Continue Reading

3 new ways the Microsoft Intune Suite offers security, simplification, and savings

Today, we are taking a significant step in completing the delivery of functionality we promised when we first unveiled the vision for the Microsoft Intune Suite.1 We are launching three new solutions: Microsoft Intune Enterprise Application Management, Microsoft Intune Advanced Analytics, and Microsoft Cloud PKI. With these additions, the Intune Suite now goes beyond unified

3 new ways the Microsoft Intune Suite offers security, simplification, and savings Continue Reading

Become a Microsoft Unified SOC Platform Ninja

(Last updated January 2024) ** The integration of Microsoft Sentinel into the Defender portal is currently in private preview, with the eventual goal of a fully integrated and aligned user experience.  The early preview, specific feature information mentioned here is under development and therefore subject to change. Our recommendation is to regularly check for new

Become a Microsoft Unified SOC Platform Ninja Continue Reading

Bridging the Gap Between Code and Cloud with Defender for Cloud

While containers have revolutionized modern software development, the complexity of dependencies in containerized environments and the expanded attack surface they present are still significant hurdles for security professionals. The initial step in securing these environments involves identifying vulnerabilities within container images. Yet, the most time-consuming task can often be identifying the right development team to

Bridging the Gap Between Code and Cloud with Defender for Cloud Continue Reading

Join us at InfoSec Jupyterthon 2024

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single,

Join us at InfoSec Jupyterthon 2024 Continue Reading

Best practices in moving to cloud native endpoint management

This blog is the second of three that details our recommendation to adopt cloud native device management. In the first post, we shared three stories explaining why large organizations moved to a cloud-native management stance. A common thread through the customer stories was how they achieved greater security, cost savings, and readiness for the future

Best practices in moving to cloud native endpoint management Continue Reading