Encryption

Contextual Risk Estimation for Effective Prioritization

Cybersecurity risks pose a significant threat to organizations of all sizes. As a result, security teams must be diligent in their efforts to protect their networks and data from potential breaches. However, with the increasing complexity of the digital environment and the expanding attack surface, security teams are faced with more and more tasks to […]

Contextual Risk Estimation for Effective Prioritization Continue Reading

Microsoft Entra’s Top 50 Features of 2023

To kick off 2024, we’re revisiting the top features delivered in Microsoft Entra over the last calendar year. We served thousands of customers to verify all types of identities and secure, manage, and govern their access to any resource with multicloud identity and network access products. We introduced the latest wave of advancements from Microsoft

Microsoft Entra’s Top 50 Features of 2023 Continue Reading

New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into

New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs Continue Reading

5 ways to secure identity and access for 2024

The security landscape is changing fast. In 2023, we saw a record-high 30 billion attempted password attacks per month, a 35% increase in demand for cybersecurity experts, and a 23% annual rise in cases processed by the Microsoft Security Response Center and Security Operations Center teams.1 This increase is due in part to the rise

5 ways to secure identity and access for 2024 Continue Reading

Intune iOS/iPadOS Management In a Nutshell

Hi, Jonas here!  Or as we say in the north of Germany: “Moin Moin!”  I’m a Microsoft Cloud Solution Architect and this blog post should give a brief overview of how to manage iOS and iPadOS devices with Microsoft Intune and how to get started. If you are planning to migrate to Intune, I highly recommend

Intune iOS/iPadOS Management In a Nutshell Continue Reading

Agentless scanning for virtual machines in the cloud – technical deep dive

Over the past three years, a notable shift has unfolded in the realm of cloud security. Increasingly, security vendors are introducing agentless scanning solutions to enhance the protection of their customers. These solutions empower users with visibility into their security posture and the ability to detect threats — all achieved without the need to install

Agentless scanning for virtual machines in the cloud – technical deep dive Continue Reading

Renew Certificate Authority Certificates on Windows Server Core. No Problem!

Hi there!  Rob and Jim are here from the Directory Services team.  Today’s blog strives to clearly elucidate an administrative procedure that comes along more frequently with PKI Hierarchies being deployed to Windows Server Core operating systems. Installing the Certificate Services Role on Windows Server Core will not be covered in this blog, but this

Renew Certificate Authority Certificates on Windows Server Core. No Problem! Continue Reading

Advancing Cybersecurity: The Latest enhancement in Phishing-Resistant Authentication

Today, I’m excited to share with you several new developments in the journey towards phishing-resistant authentication for all users!  This isn’t just essential for compliance with Executive Order 14028 on Improving the Nation’s Cybersecurity but is increasingly critical for the safety of all the orgs and users who bet on digital identity. TL;DR? Here’s the cheat

Advancing Cybersecurity: The Latest enhancement in Phishing-Resistant Authentication Continue Reading

Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server

Microsoft discovered, responsibly disclosed, and helped remediate four vulnerabilities that could be remotely exploited by unauthenticated attackers in Perforce Helix Core Server (“Perforce Server”), a source code management platform largely used in the videogame industry and by multiple organizations spanning government, military, technology, retail, and more. Perforce Server customers are strongly urged to update to

Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server Continue Reading