Authentication

Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season

Cybercriminals use social engineering during holidays and important events like tax season to steal user information. Our new Microsoft Threat Intelligence tax season report outlines some of the various techniques that threat actors use to craft their campaigns and mislead taxpayers into revealing sensitive information, making payments to fake services, or installing malicious payloads. These […]

Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season Continue Reading

Enhancing protection: Updates on Microsoft’s Secure Future Initiative

At Microsoft, we’re continually evolving our cybersecurity strategy to stay ahead of threats targeting our products and customers. As part of our efforts to prioritize transparency and accountability, we’re launching a regular series on milestones and progress of the Secure Future Initiative (SFI)—a multi-year commitment advancing the way we design, build, test, and operate our

Enhancing protection: Updates on Microsoft’s Secure Future Initiative Continue Reading

​​Secure SaaS applications with Valence Security and Microsoft Security​​

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.   Software as a service (SaaS) adoption has accelerated at a lightning speed, enabling collaboration, automation, and innovation for businesses large and small across every industry vertical—from government, education, financial service to tech companies. Every SaaS application is

​​Secure SaaS applications with Valence Security and Microsoft Security​​ Continue Reading

How to Set Up Sentinel Data Connectors for Kubernetes and GitHub

A guide to configure and use Sentinel Connectors to collect logs and data from your Kubernetes clusters and GitHub CI/CD pipelines. Part 2 of 3 part series about security monitoring of your Kubernetes Clusters and CI/CD pipelines by @singhabhi and @Umesh_Nagdev Link to Part 1 Introduction In part 1 of this series, we discussed the type of log sources you

How to Set Up Sentinel Data Connectors for Kubernetes and GitHub Continue Reading

Monitoring Kubernetes Clusters, Image Build Environment and Container Registries with Sentinel

A guide to using Microsoft Sentinel for monitoring the security of your containerized applications and orchestration platforms. Part 1 of 3 part series about security monitoring of your Kubernetes Clusters and CI/CD pipelines by @singhabhi and @Umesh_Nagdev   Introduction  Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that provides comprehensive threat detection and response capabilities

Monitoring Kubernetes Clusters, Image Build Environment and Container Registries with Sentinel Continue Reading

Protecting Tier 0 the Modern Way

How should your Tier 0 Protection look like? Almost every attack on Active Directory you hear about today – no matter if ransomware is involved or not – (ab)uses credential theft techniques as the key factor for successful compromise. Microsoft’s State of Cybercrime report confirms this statement: “The top finding among ransomware incident response engagements

Protecting Tier 0 the Modern Way Continue Reading

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE

Mobile devices are increasingly targeted by cyberattacks that can compromise your data, privacy, and productivity. To protect your devices from these threats, you need a Mobile Threat Defense (MTD) solution that can detect and respond to malicious activities on your device and network. Microsoft Defender for Endpoint is a unified endpoint security platform that provides

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE Continue Reading

Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI

The world of cybersecurity is undergoing a massive transformation. AI is at the forefront of this change, and has the potential to empower organizations to defeat cyberattacks at machine speed, address the cyber talent shortage, and drive  innovation and efficiency in cybersecurity. However, adversaries can use AI as part of their exploits, and it’s never

Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI Continue Reading

Staying ahead of threat actors in the age of AI

Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. At the same time, it is also important

Staying ahead of threat actors in the age of AI Continue Reading

Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team

Organizations everywhere are on a lightning-fast learning trajectory to understand the potential of generative AI and its implications for their security, their workforce, and the industry at large. AI is quickly becoming a force multiplier—presenting significant opportunities for security teams to increase productivity, save time, upskill resources, and more. News and information about “the age

Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team Continue Reading