Remote Desktop Services

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services

Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and response (MXDR) by unifying our human-driven services and Microsoft Defender XDR in the MITRE Engenuity ATT&CK® Evaluations: Managed Services menuPass + ALPHV BlackCat.    Defender Experts for XDR offers a range of capabilities:  Managed detection and response: Let our expert analysts manage your Microsoft Defender […]

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services Continue Reading

Detect suspicious processes running on hidden desktops

With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.     That’s why today we are excited

Detect suspicious processes running on hidden desktops Continue Reading

Securing cloud-native applications in the age of AI: Defender for Cloud sets a new standard

In the fast-paced world of cloud computing, security teams are facing unprecedented challenges. As organizations increasingly adopt multicloud environments and prioritize the development of cloud-native applications, the complexity of ensuring robust security has grown exponentially. Moreover, as the AI transformation accelerates innovation, productivity, and business agility, attackers are also using it to their advantage. They

Securing cloud-native applications in the age of AI: Defender for Cloud sets a new standard Continue Reading

Microsoft Defender for Open-Source Relational Databases Now Supports Multicloud (AWS RDS)

Introduction: Many organizations use multiple cloud providers today, which makes security misconfigurations more likely due to the solution scale and complexity. Moreover, different practices and concepts among each cloud provider’s implementation create bigger internal knowledge gaps. No matter how many cloud providers an organization uses, a database is the core of each application, storing the

Microsoft Defender for Open-Source Relational Databases Now Supports Multicloud (AWS RDS) Continue Reading

Speaking in Ciphers and other Enigmatic tongues fresh content update!

First published on TechNet on Dec 08, 2015 Hi! Jim Tierney here again to talk to you about Cryptographic Algorithms, SCHANNEL and other bits of wonderment. My original post on the topic has gone through yet another rewrite to bring you up to date on recent changes in this crypto space. So, your company purchases

Speaking in Ciphers and other Enigmatic tongues fresh content update! Continue Reading

Exposure Management: The Evolution of Vulnerability Management

Traditional Vulnerability Management As security professionals, we’re tasked with the seemingly impossible job of staying one step ahead of attackers. This task is made more challenging by the constantly evolving threat landscape as well as the silos that exist within our businesses, security teams, and even our tooling. The technology and architecture required to support

Exposure Management: The Evolution of Vulnerability Management Continue Reading

Protecting Tier 0 the Modern Way

How should your Tier 0 Protection look like? Almost every attack on Active Directory you hear about today – no matter if ransomware is involved or not – (ab)uses credential theft techniques as the key factor for successful compromise. Microsoft’s State of Cybercrime report confirms this statement: “The top finding among ransomware incident response engagements

Protecting Tier 0 the Modern Way Continue Reading

Contextual Risk Estimation for Effective Prioritization

Cybersecurity risks pose a significant threat to organizations of all sizes. As a result, security teams must be diligent in their efforts to protect their networks and data from potential breaches. However, with the increasing complexity of the digital environment and the expanding attack surface, security teams are faced with more and more tasks to

Contextual Risk Estimation for Effective Prioritization Continue Reading

Azure Bastion with Azure Virtual Wan Microsoft #Azure #AzureBastion #AzureNetworking #Vwan #AzOps #blogpost #MVPBuzz

Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal, or via the native SSH or RDP client already installed on your local computer. The Azure Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides

Azure Bastion with Azure Virtual Wan Microsoft #Azure #AzureBastion #AzureNetworking #Vwan #AzOps #blogpost #MVPBuzz Continue Reading

Active Directory Hardening Series – Part 2 – Removing SMBv1

Hi All!  Jerry Devore back again with another hardening Active Directory topic.  Before we jump into the technical stuff, I would like to briefly share some tips for structuring a protocol hardening project.  I picked up these suggestions from working with customers who have been successful in their protocol hardening efforts. Tip #1 – Collaborate

Active Directory Hardening Series – Part 2 – Removing SMBv1 Continue Reading