Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'Microsoft' | www.SecurityPhresh.com
Security News from 'Microsoft'
Showing 'Security News from 'Microsoft'' from 11 to 20
Partnerships Power The Future Of Better Security
22nd May 2018 [28 days ago] from Microsoft
This post is authored by Jeremy Dallman, Principal Program Manager. Our goal in building the Microsoft Graph Security API is to enable customers to share insights and take action across security solutions to improve protection and speed...
Now That You Have A Plan, It’s Time To Start Deploying
17th May 2018 [one month ago] from Microsoft
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption...
Securing The Modern Workplace With Microsoft 365 Threat Protection – Part 4
16th May 2018 [one month ago] from Microsoft
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Responding to ransomware in the Modern Workplace Over the last few weeks, we have shared the roots of Microsoft 365 threat protection and how...
Use Windows Information Protection (WIP) To Help Make Accidental Data Leakage A Thing Of The Past
15th May 2018 [one month ago] from Microsoft
Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection...
The Final Compliance Countdown: Are You Ready For GDPR?
10th May 2018 [one month ago] from Microsoft
On May 25, the General Data Protection Regulation (GDPR) will replace the Data Protection Directive as the new standard on data privacy for all organizations that do business with European Union (EU) citizens.[1]When GDPR goes into effect,...
Enhancing Office 365 Advanced Threat Protection With Detonation-based Heuristics And Machine Learning
10th May 2018 [one month ago] from Microsoft
Email, coupled with reliable social engineering techniques, continues to be one of the primary entry points for credential phishing, targeted attacks, and commodity malware like ransomware and, increasingly in the last few months, cryptocurrency...
Here Is Homeland Security, Black Swans, And Thwarted Cyberattacks
9th May 2018 [one month ago] from Microsoft
Last week, I had the honor of addressing The Homeland Security Training Institute (HSTI) at the College of DuPage as part of the HSTI Live educational series. The event featured other prominent speakers at the forefront of cybersecurity...
Securing The Modern Workplace With Microsoft 365 Threat Protection – Part 2
2nd May 2018 [2 months ago] from Microsoft
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. Protecting the modern workplace against Ransomware Last week, we shared the roots of Microsoft 365 threat protection. This week, we want to...
Building A World Without Passwords
1st May 2018 [2 months ago] from Microsoft
Nobody likes passwords. They are inconvenient, insecure, and expensive. In fact, we dislike them so much that weve been busy at work trying to create a world without them a world without passwords. In this blog, we will provide a brief...
First Things First: Envisioning Your Security Deployment
1st May 2018 [2 months ago] from Microsoft
This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption...
« Newer 1 2 3 4 5 6 7 8 Older »