Encryption

Windows Insider build 26090 brings small changes for SMB

Heya folks, Ned here again. We continue to make SMB changes to Windows vNext and Windows Server 2025 based on customer feedback and last mile work. With the release of Windows 11 Insider Preview Build 26090 (Canary and Dev Channels), we have a few more small ones. Some of these were based on Insider feedback from customers – […]

Windows Insider build 26090 brings small changes for SMB Continue Reading

Azure Firewall: Comprehensive Comparison & Best Practices

Azure Firewall, a managed, cloud-based network security service, is an essential component of Azure’s security offerings. It comes in three different versions – Basic, Standard, and Premium – each designed to cater to a wide range of customer use cases and preferences. This blog post will provide a comprehensive comparison of these versions, discuss best

Azure Firewall: Comprehensive Comparison & Best Practices Continue Reading

SMB client encryption mandate now supported in Windows Insider

Heya folks, Ned here again. Beginning in Windows 11 Insider Preview Build 25982  (Canary Channel) and Windows Server Preview Build 25997, SMB now supports requiring encryption of all outbound SMB client connections. With this new option, administrators can mandate that all destination servers support SMB 3.x and encryption, and if missing those capabilities, the client won’t connect. This

SMB client encryption mandate now supported in Windows Insider Continue Reading

Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview

Today, I am excited to announce the public preview of our unified security operations platform. When we announced a limited preview in November 2023, it was one of the first security operations center platforms that brought together the full capabilities of an industry-leading cloud-native security information and event management (SIEM), comprehensive extended detection and response

Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview Continue Reading

Speaking in Ciphers and other Enigmatic tongues fresh content update!

First published on TechNet on Dec 08, 2015 Hi! Jim Tierney here again to talk to you about Cryptographic Algorithms, SCHANNEL and other bits of wonderment. My original post on the topic has gone through yet another rewrite to bring you up to date on recent changes in this crypto space. So, your company purchases

Speaking in Ciphers and other Enigmatic tongues fresh content update! Continue Reading

Protect Against OWASP API Top 10 Security Risks Using Defender for APIs

Overview The Open Web Application Security Project (OWASP) Foundation is a nonprofit foundation dedicated to improving software security through community-led open-source projects, education, and transparency. The OWASP API Security Project focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of APIs. In this post, we’ll dive into how Defender

Protect Against OWASP API Top 10 Security Risks Using Defender for APIs Continue Reading

MDTI Earns Impactful Trio of ISO Certificates

We are excited to announce that Microsoft Defender Threat Intelligence (MDTI) has achieved ISO 27001, ISO 27017 and ISO 27018 certifications. The ISO, the International Organization for Standardization, develops market relevant international standards that support innovation and provide solutions to global challenges, including information security requirements around establishing, implementing, and improving an Information Security Management

MDTI Earns Impactful Trio of ISO Certificates Continue Reading

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE

Mobile devices are increasingly targeted by cyberattacks that can compromise your data, privacy, and productivity. To protect your devices from these threats, you need a Mobile Threat Defense (MTD) solution that can detect and respond to malicious activities on your device and network. Microsoft Defender for Endpoint is a unified endpoint security platform that provides

Protect unmanaged or 3rd party MDM managed iOS/Android devices with MDE Continue Reading

Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI

The world of cybersecurity is undergoing a massive transformation. AI is at the forefront of this change, and has the potential to empower organizations to defeat cyberattacks at machine speed, address the cyber talent shortage, and drive  innovation and efficiency in cybersecurity. However, adversaries can use AI as part of their exploits, and it’s never

Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI Continue Reading

More Speaking in Ciphers and other Enigmatic Tongues with a focus on SCHANNEL hardening.

Hi! Jim Tierney here again to talk to you about Cryptographic Algorithms, SCHANNEL and other bits of crypto excitement. I have elucidated at length on this topic in this post which had been updated a few years back to the aptly titled, Speaking in Ciphers and other Enigmatic tongues…update! I am creating this brand-new piece

More Speaking in Ciphers and other Enigmatic Tongues with a focus on SCHANNEL hardening. Continue Reading