Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'Microsoft' | www.SecurityPhresh.com
Security News from 'Microsoft'
Showing 'Security News from 'Microsoft'' from 21 to 30
Perspectives Of A Former CISO: Disrupted Security In Digitalization
2nd Jul 2018 [2 months ago] from Microsoft
My passion is the connection of security to the business objectives, and it has been a part of my work with many CISOs across industries as well as my experience as a CISO. This blog series a compilation of my learnings as a CISO, as well...
Taking Apart A Double Zero-day Sample Discovered In Joint Hunt With ESET
2nd Jul 2018 [2 months ago] from Microsoft
In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During...
The Need And Opportunity For Adaptive Prevention In The Cloud
26th Jun 2018 [2 months ago] from Microsoft
This post is authored by Michael Bargury, Data Scientist, C+E Security. The need The cloud introduces new security challenges, which differ from classic ones by diversity and scale. Once a Virtual Machine (VM) is up and running with an...
Driving Data Security Is A Shared Responsibility, Here’s How You Can Protect Yourself
19th Jun 2018 [2 months ago] from Microsoft
Youre driving a long, dark road on a rainy night. If youre driving 20 miles over the speed limit and you dont step on the brakes when the car in front of you comes to a sudden stop, is it your fault or your car manufacturers fault if you...
New FastTrack Benefit: Deployment Support For Co-management On Windows 10 Devices
18th Jun 2018 [2 months ago] from Microsoft
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption...
Building Zero Trust Networks With Microsoft 365
14th Jun 2018 [2 months ago] from Microsoft
The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public...
Updating Your Cybersecurity Strategy To Enable And Accelerate Digital Transformation
12th Jun 2018 [2 months ago] from Microsoft
This post is authored by Cyril Voisin, Cheif Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done. For example, it...
Machine Learning Vs. Social Engineering
7th Jun 2018 [2 months ago] from Microsoft
Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown...
Cybersecurity Reference Architecture: Security For A Hybrid Enterprise
6th Jun 2018 [2 months ago] from Microsoft
The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little...
Virtualization-based Security (VBS) Memory Enclaves: Data Protection Through Isolation
5th Jun 2018 [3 months ago] from Microsoft
The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »