Select Page
Business email compromise campaign targets wide range of orgs with gift card scam

Business email compromise campaign targets wide range of orgs with gift card scam

Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to ... continue reading

Afternoon Cyber Tea: Cybersecurity has become a pillar of the business

In a famous two-part episode of “Star Trek: The Next Generation,” Captain Jean-Luc Picard is captured by the Cardassians. During a pivotal scene, a Cardassian interrogator shows Picard four bright lights and demands that he “see” five lights. Picard resists, ... continue reading
An infographic that shows the flow of context-aware discovery based on machine learning.

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of customer or employee personal information, they must report it within the required time frame. The size and scope ... continue reading
Azure Security Center / Azure Defender

Microsoft Secure Score Across the Microsoft Security Stack

Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will walk you through various Microsoft products from the Microsoft Security Stack and explain ... continue reading

Minecraft Earth and Azure Cosmos DB part 2: Delivering turnkey geographic distribution

This post is part 2 of a two-part series about out how organizations are using Azure Cosmos DB to meet real world needs and the difference it’s making to them. In part 1, we explored the challenges that led service ... continue reading
Protect your customer accounts with passwordless mobile authentication

Protect your customer accounts with passwordless mobile authentication

Hello! In today’s ‘Voice of the ISV’ story, Jim Small and Milan Radojkovic at IPification describe how IPification mobile authentication and Azure Active Directory (Azure AD) B2C deliver improved security and a better user experience to our mutual customers. Don’t ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 4 – Apps

For our third stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Application security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution

Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution

Technology continues to play a critical role in shaping the global risks landscape for individuals, governments, and businesses. According to the World Economic Forum’s Global Risks Report 2020, cyberattacks are ranked as the second risk of greatest concern for business ... continue reading
Download Data Protection and Privacy Compliance in the Cloud

10 recommendations for cloud privacy and security with Ponemon research

Today we’re pleased to publish Data Protection and Privacy Compliance in the Cloud: Privacy Concerns Are Not Slowing the Adoption of Cloud Services, but Challenges Remain, original research sponsored by Microsoft and independently conducted by the Ponemon Institute. The report ... continue reading