Quantcast
Channel: Zero Trust Insights | Microsoft Security Blog
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

XDR meets IAM: Comprehensive identity threat detection and response with...

Identity has become the corporate security perimeter. The average organization used 130 different cloud applications in 2022. That’s up 18 percent from 2021 alone.1 And as organizations continue to...

View Article



Image may be NSFW.
Clik here to view.

Why endpoint management is key to securing an AI-powered future

The chief information security officer (CISO) agenda has a new set of priorities. Hybrid work and the resultant architecture updates, so prevalent at the beginning of the pandemic, are no longer top...

View Article

Image may be NSFW.
Clik here to view.

11 best practices for securing data in cloud services

In today’s digital age, cloud computing has become an essential part of businesses, enabling them to store and access their data from anywhere. However, with convenience comes the risk of data...

View Article

Image may be NSFW.
Clik here to view.

Meet unprecedented security challenges by leveraging MXDR services

We know customers of every size face ever-increasing security risks. In just the last 12 months the speed of attackers leveraging breaches is also increasing, as it only takes 72 minutes on average...

View Article

Image may be NSFW.
Clik here to view.

New Microsoft identity and data security capabilities to accelerate CMMC...

As Department of Defense (DoD) Chief Information Officer Hon. John Sherman said recently, Cybersecurity Maturity Model Certification (CMMC) is necessary to ensure that the United States raises the bar...

View Article


Adopting guidance from the US National Cybersecurity Strategy to secure the...

The recently published United States National Cybersecurity Strategy warns that many popular Internet of Things (IoT) devices are not sufficiently secure to protect against many of today’s common...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Purview data security mitigations for BazaCall and other...

I recently worked with an enterprise customer who experienced a data exfiltration attack using the characteristics of the BazaCall campaign. BazaCall can be both a ransomware and data exfiltration...

View Article

Image may be NSFW.
Clik here to view.

Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers...

Microsoft is proud to be recognized as a Leader in the Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report. At Microsoft, we understand modernizing security is a complex task in this era of...

View Article


Image may be NSFW.
Clik here to view.

Automatic Conditional Access policies in Microsoft Entra streamline identity...

Extending our commitment to help customers be secure by default, today we’re announcing the auto-rollout of Microsoft Entra Conditional Access policies that will automatically protect tenants based on...

View Article


Image may be NSFW.
Clik here to view.

Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for...

Maintaining a secure and optimized digital environment allows new ideas to flourish wherever they occur. In the modern workplace, where devices and locations are no longer fixed, Microsoft Intune...

View Article

Image may be NSFW.
Clik here to view.

3 new ways the Microsoft Intune Suite offers security, simplification, and...

The power of endpoint management Learn how to empower your workforce  Today, we are taking a significant step in completing the delivery of functionality we promised when we first unveiled the vision...

View Article

Image may be NSFW.
Clik here to view.

Navigating NIS2 requirements with Microsoft Security solutions

The Network and Information Security Directive 2 (NIS2) is a continuation and expansion of the previous European Union (EU) cybersecurity directive introduced back in 2016. With NIS2, the EU expands...

View Article

Image may be NSFW.
Clik here to view.

New Microsoft guidance for the DoD Zero Trust Strategy

The Department of Defense (DoD) Zero Trust Strategy1 and accompanying execution roadmap2 sets a path for achieving enterprise-wide target-level Zero Trust by 2027. The roadmap lays out vendor-agnostic...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images