This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. As more employees work[…]
Leggi di piùMicrosoft Power Platform recently commissioned a Forrester Total Economic Impact study to help customers better understand the value of Microsoft[…]
Leggi di piùThe Department of Defense (DoD) released its formal Zero Trust strategy today, marking a major milestone in its goal of[…]
Leggi di piùNotebooks are gaining popularity in InfoSec. Used interactively for investigations and hunting or as scheduled processing jobs, notebooks offer plenty[…]
Leggi di piùVulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure[…]
Leggi di piùRecent activity from the threat actor that Microsoft tracks as DEV-0569, known to distribute various payloads, has led to the[…]
Leggi di piùOn August 4, 2022, Microsoft publicly shared a framework that it has been using to secure its own development practices[…]
Leggi di piùAs organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to[…]
Leggi di piùThe holiday season is an exciting time for many people as they get to relax, connect with friends and family,[…]
Leggi di piùThe General Data Protection Regulation (GDPR) came into effect in 2018 and set a new standard for the level of[…]
Leggi di piùAt CyberWarCon 2022, Microsoft and LinkedIn analysts presented several sessions detailing analysis across multiple sets of actors and related activity.[…]
Leggi di piùMicrosoft Defender Experts for Hunting, our newest managed threat hunting service, delivered industry-leading results during the inaugural MITRE Engenuity ATT&CK®[…]
Leggi di più