XDR meets IAM: Comprehensive identity threat detection and response with...
Identity has become the corporate security perimeter. The average organization used 130 different cloud applications in 2022. That’s up 18 percent from 2021 alone.1 And as organizations continue to...
View ArticleWhy endpoint management is key to securing an AI-powered future
The chief information security officer (CISO) agenda has a new set of priorities. Hybrid work and the resultant architecture updates, so prevalent at the beginning of the pandemic, are no longer top...
View Article11 best practices for securing data in cloud services
In today’s digital age, cloud computing has become an essential part of businesses, enabling them to store and access their data from anywhere. However, with convenience comes the risk of data...
View ArticleMeet unprecedented security challenges by leveraging MXDR services
We know customers of every size face ever-increasing security risks. In just the last 12 months the speed of attackers leveraging breaches is also increasing, as it only takes 72 minutes on average...
View ArticleNew Microsoft identity and data security capabilities to accelerate CMMC...
As Department of Defense (DoD) Chief Information Officer Hon. John Sherman said recently, Cybersecurity Maturity Model Certification (CMMC) is necessary to ensure that the United States raises the bar...
View ArticleAdopting guidance from the US National Cybersecurity Strategy to secure the...
The recently published United States National Cybersecurity Strategy warns that many popular Internet of Things (IoT) devices are not sufficiently secure to protect against many of today’s common...
View ArticleMicrosoft Purview data security mitigations for BazaCall and other...
I recently worked with an enterprise customer who experienced a data exfiltration attack using the characteristics of the BazaCall campaign. BazaCall can be both a ransomware and data exfiltration...
View ArticleForrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers...
Microsoft is proud to be recognized as a Leader in the Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report. At Microsoft, we understand modernizing security is a complex task in this era of...
View ArticleAutomatic Conditional Access policies in Microsoft Entra streamline identity...
Extending our commitment to help customers be secure by default, today we’re announcing the auto-rollout of Microsoft Entra Conditional Access policies that will automatically protect tenants based on...
View ArticleForrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for...
Maintaining a secure and optimized digital environment allows new ideas to flourish wherever they occur. In the modern workplace, where devices and locations are no longer fixed, Microsoft Intune...
View Article3 new ways the Microsoft Intune Suite offers security, simplification, and...
The power of endpoint management Learn how to empower your workforce Today, we are taking a significant step in completing the delivery of functionality we promised when we first unveiled the vision...
View ArticleNavigating NIS2 requirements with Microsoft Security solutions
The Network and Information Security Directive 2 (NIS2) is a continuation and expansion of the previous European Union (EU) cybersecurity directive introduced back in 2016. With NIS2, the EU expands...
View ArticleNew Microsoft guidance for the DoD Zero Trust Strategy
The Department of Defense (DoD) Zero Trust Strategy1 and accompanying execution roadmap2 sets a path for achieving enterprise-wide target-level Zero Trust by 2027. The roadmap lays out vendor-agnostic...
View Article
More Pages to Explore .....