
Taking apart a double zero-day sample discovered in joint hunt with ESET
In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel ... continue reading

#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM
Azure Security Center Standard includes: Hybrid security – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security ... continue reading

Building Zero Trust networks with Microsoft 365
The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own ... continue reading

Machine learning vs. social engineering
Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few ... continue reading

Virtualization-based security (VBS) memory enclaves: Data protection through isolation
The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote ... continue reading
From the ground up to the cloud: Microsoft’s Intelligent Security supporting CISOs’ cloud transformation
Its no secret that Microsoft has embraced the cloud in a big wayfrom enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to ... continue reading

Securing the modern workplace with Microsoft 365 threat protection – part 4
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Responding to ransomware in the Modern Workplace Over the last few weeks, we have shared the roots of Microsoft 365 threat protection and how Microsoft 365 ... continue reading

Securing the modern workplace with Microsoft 365 threat protection – part 2
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Protecting the modern workplace against Ransomware Last week, we shared the roots of Microsoft 365 threat protection. This week, we want to share how Microsoft 365 ... continue reading

Securing the modern workplace with Microsoft 365 threat protection – part 1
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. The roots of Microsoft 365 threat protection Over the next few weeks, well introduce you to Microsoft 365s threat protection services and demonstrate how Microsoft 365s ... continue reading
Tapping the intelligent cloud to make security better and easier
There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking can we still keep our assets secure as we adopt cloud services?, to declaring, we are adopting cloud services in ... continue reading