Select Page

Collaborative innovation on display in Microsoft’s insider risk management strategy

The disrupted work environment, in which enterprises were forced to find new ways to enable their workforce to work remotely, changed the landscape for operations as well as security. One of the top areas of concern is effectively managing insider ... continue reading
™

Digital Defense integrates with Microsoft to detect attacks missed by traditional endpoint security

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. You can learn more about MISA here.  Cybercriminals have ramped up their initial compromises through phishing and pharming attacks using a variety of tools and tactics that, ... continue reading
Legacy access model

Modernize secure access for your on-premises resources with Zero Trust

Change came quickly in 2020. More likely than not, a big chunk of your workforce has been forced into remote access. And with remote work came an explosion of bring-your-own-device (BYOD) scenarios, requiring your organization to extend the bounds of ... continue reading

Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA here.   Security teams are struggling to reduce the time to detect and respond to threats due to the complexity and volume ... continue reading
tantran55_1-1596459568602.png

Microsoft Defender for Endpoint – MD ATP Daily Operation – Part 1

Hi IT Pros, I have combined the information for Security Team who monitors, responds and manages the ATP Portal on a daily basis. Please check it out and give your feedback. For Alert Notification and Live Response with remediation and ... continue reading
ASC-AzureDefender.png

What is Azure Defender?

Mention the name "Defender" in relation to Microsoft and I'm taken back to the launch of the Windows Defender anti-spyware product, in 2006. This was truly breaking news that Microsoft would launch their own protection software, off the back of ... continue reading
MDfI3.gif

Microsoft Defender for Identity – Azure ATP Daily Operation

Hi IT Pros, I would like to continue the blog about Microsoft Defender for Identity with topic related to the daily operation of SecOp Team who traces all attacks against Identities stored in your on-prem Active Directory domain controllers. Please ... continue reading
Top 10 Best Practices for Azure Security

Top 10 Best Practices for Azure Security

Our Azure products and services come with comprehensive security features and configuration settings. They are mostly customizable (to a point), so you can define and implement a security posture that reflects the need of your organization. But adopting & maintaining ... continue reading
Image of the shared responsibility model showing customer, service, and cloud responsibilities

Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the ... continue reading
An image of the management of the lifecycle of a discovered app.

Microsoft Zero Trust deployment guide for your applications

Introduction More likely than not, your organization is in the middle of a digital transformation characterized by increased adoption of cloud apps and increased demand for mobility. In the age of remote work, users expect to be able to connect to any resource, on any device, from ... continue reading