Author: Emma Jones

The last decade has been full of disruptions that have required organizations to adapt and accelerate their security transformation. As we look forward to the next major disruption—the move to hybrid work—one thing is clear: the pace of change isn’t slowing down.

The post Zero Trust Adoption Report: How does your organization compare? appeared first on Microsoft Security Blog.

Read More Zero Trust Adoption Report: How does your organization compare?

Today on the Official Microsoft Blog, Microsoft announced the acquisition of CloudKnox Security, a leader in Cloud Infrastructure Entitlement Management (CIEM). CloudKnox offers complete visibility into privileged access.

The post Microsoft acquires CloudKnox Security to offer unified privileged access and cloud entitlement management appeared first on Microsoft Security Blog.

Read More Microsoft acquires CloudKnox Security to offer unified privileged access and cloud entitlement management

As containers become a major part of many organizations’ IT workloads, it becomes crucial to consider the unique security threats that target such environments when building security solutions. The first step in this process is understanding the relevant attack landscape.

The post The evolution of a matrix: How ATT&CK for Containers was built appeared first on Microsoft Security Blog.

Read More The evolution of a matrix: How ATT&CK for Containers was built

Our world is changing, and Microsoft Security is rising to the challenges of a new normal. Today, I want to share more about how we are empowering our partners to be successful in building trust with customers and enabling business growth.

The post How Microsoft Security empowers partners to build customer trust appeared first on Microsoft Security Blog.

Read More How Microsoft Security empowers partners to build customer trust

Microsoft is announcing that we have entered into a definitive agreement to acquire RiskIQ, a leader in global threat intelligence and attack surface management, to help our shared customers build a more comprehensive view of the global threats to their businesses, better understand vulnerable internet-facing assets, and build world-class threat intelligence.

The post Microsoft to acquire RiskIQ to strengthen cybersecurity of digital transformation and hybrid work appeared first on Microsoft Security Blog.

Read More Microsoft to acquire RiskIQ to strengthen cybersecurity of digital transformation and hybrid work

We’re excited to announce that in its first year of inclusion in the Magic Quadrant report, Microsoft Azure Sentinel has been named a Visionary, where we were recognized for our completeness of vision for SIEM.

The post Microsoft named a Visionary in the 2021 Gartner Magic Quadrant for SIEM for Azure Sentinel appeared first on Microsoft Security Blog.

Read More Microsoft named a Visionary in the 2021 Gartner Magic Quadrant for SIEM for Azure Sentinel

The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women.

The post Encouraging women to embrace their cybersecurity superpowers appeared first on Microsoft Security Blog.

Read More Encouraging women to embrace their cybersecurity superpowers

The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women.

The post Encouraging women to embrace their cybersecurity superpowers appeared first on Microsoft Security Blog.

Read More Encouraging women to embrace their cybersecurity superpowers

Over the last year, PCs have kept us connected to family, friends, and enabled businesses to continue to run. This new hybrid work paradigm has got us thinking about how we will continue to deliver the best possible quality, experience, and security for the more than 1 billion people who use Windows.

The post Windows 11 enables security by design from the chip to the cloud appeared first on Microsoft Security Blog.

Read More Windows 11 enables security by design from the chip to the cloud

Over the last year, PCs have kept us connected to family, friends, and enabled businesses to continue to run. This new hybrid work paradigm has got us thinking about how we will continue to deliver the best possible quality, experience, and security for the more than 1 billion people who use Windows.

The post Windows 11 enables security by design from the chip to the cloud appeared first on Microsoft Security Blog.

Read More Windows 11 enables security by design from the chip to the cloud

CRSP is a worldwide team of cybersecurity experts operating in most countries, across all organizations, with deep expertise to secure an environment post-security breach and to help you prevent a breach in the first place.

The post CRSP: The emergency team fighting cyber attacks beside customers appeared first on Microsoft Security Blog.

Read More CRSP: The emergency team fighting cyber attacks beside customers

CRSP is a worldwide team of cybersecurity experts operating in most countries, across all organizations, with deep expertise to secure an environment post-security breach and to help you prevent a breach in the first place.

The post CRSP: The emergency team fighting cyber attacks beside customers appeared first on Microsoft Security.

Read More CRSP: The emergency team fighting cyber attacks beside customers

We’re excited to announce seamless integration between Azure Firewall and Azure Sentinel. Now, you can get both detection and prevention in the form of an easy-to-deploy Azure Firewall solution for Azure Sentinel.

The post Optimize security with Azure Firewall solution for Azure Sentinel appeared first on Microsoft Security Blog.

Read More Optimize security with Azure Firewall solution for Azure Sentinel

On Thursday, June 3rd, via a joint press release on Microsoft Stories, Hart InterCivic and Microsoft have announced a partnership to incorporate ElectionGuard software developed by Microsoft into Hart’s Verity voting systems.

The post Hart and Microsoft announce partnership to incorporate ElectionGuard appeared first on Microsoft Security.

Read More Hart and Microsoft announce partnership to incorporate ElectionGuard

Smart meters and smart grid infrastructure have been deployed in many of the world’s electric distribution grids. They promise energy conservation, better grid management for utilities, electricity theft reduction, and a host of value-added services for consumers.

The post Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview appeared first on Microsoft Security.

Read More Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system.

The post Microsoft acquires ReFirm Labs to enhance IoT security appeared first on Microsoft Security.

Read More Microsoft acquires ReFirm Labs to enhance IoT security

The cybersecurity landscape has fundamentally changed, as evidenced by large-scale, complex attacks like Nobelium, Hafnium, and more recently last week’s Colonial Pipeline attack, which signals that human-operated ransomware is on the rise. Hackers launch an average of 50 million password attacks every day—579 per second. Phishing attacks have increased. Firmware attacks are on the rise,…

The post Securing a new world of hybrid work: What to know and what to do appeared first on Microsoft Security.

Read More Securing a new world of hybrid work: What to know and what to do

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Operators must manage industrial control systems as well as IT environments that are part of critical infrastructure or can form attack surfaces for control systems.

The post Meet critical infrastructure security compliance requirements with Microsoft 365 appeared first on Microsoft Security.

Read More Meet critical infrastructure security compliance requirements with Microsoft 365

With cryptocurrency mining on the rise, Microsoft and Intel have partnered to deliver threat detection technology to enable EDR capabilities in Microsoft Defender for Endpoint.

The post Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT appeared first on Microsoft Security.

Read More Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT

For the third year in a row, Microsoft successfully demonstrated industry-leading defense capabilities in the independent MITRE ATT&CK evaluation.

The post MITRE Engenuity ATT&CK® Evaluation proves Microsoft Defender for Endpoint stops advanced attacks across platforms appeared first on Microsoft Security.

Read More MITRE Engenuity ATT&CK® Evaluation proves Microsoft Defender for Endpoint stops advanced attacks across platforms