Home
Amsterdam
Pictures
Photography
WebDesign
ScanService
Support
Search
News
Newsletter
Uncovering cross-process injection with Windows Defender ATP
How to solve the diversity problem in security
Windows Defender ATP machine learning: Detecting new and unusual breach activity
Windows Defender ATP machine learning: Detecting new and unusual breach activity
Attack inception: Compromised supply chain within a supply chain poses new risks
Detecting reflective DLL loading with Windows Defender ATP
Windows Defender ATP machine learning and AMSI: Unearthing script-based attacks that ‘live off the land’
Introducing Windows Defender System Guard runtime attestation
Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework
Microsoft Intelligent Security Association expands with new members and products
Practical application of artificial intelligence that can transform cybersecurity
Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV
Tackling phishing with signal-sharing and machine learning
Two new Microsoft 365 offerings help address security and compliance needs
The language of InfoSec
Oversharing and safety in the age of social media
Detecting credential theft through memory access modelling with Microsoft Defender ATP
Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection
Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack
Preparing your enterprise to eliminate passwords
New machine learning model sifts through the good to unearth the bad in evasive malware
Better cybersecurity requires a diverse and inclusive approach to AI and machine learning
How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection
A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response
From unstructured data to actionable intelligence: Using machine learning for threat intelligence
One simple action you can take to prevent 99.9 percent of attacks on your accounts
Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
New methods for detecting malicious PowerShell
Operational resilience begins with your commitment to and investment in cyber resilience
Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware
Rethinking how we learn security
Your password doesn’t matter—but MFA does!
How to avoid getting caught in a “Groundhog Day” loop of security issues
In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks
Microsoft and partners design new device security requirements to protect against targeted firmware attacks
Human-operated ransomware attacks: A preventable disaster
Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks
Protecting against coronavirus themed phishing attacks
Making it easier for your remote workforce to securely access all the apps they need, from anywhere
Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do
Protecting your data and maintaining compliance in a remote work environment
Microsoft shares new threat intelligence, security guidance during global crisis
Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk
Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection
Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise
Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security
Best practices for defending Azure Virtual Machines
Advanced protection for web applications in Azure with Radware’s Microsoft Security integration
CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats
Cyberattacks against machine learning systems are more common than you think
Unilever CISO on balancing business risks with cybersecurity
Zerologon is now detected by Microsoft Defender for Identity
Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services
Microsoft Security: How to cultivate a diverse cybersecurity team
Understanding influences shaping the cybersecurity landscape, enabling digital transformation, and helping to protect our planet
Digital Defense integrates with Microsoft to detect attacks missed by traditional endpoint security
New cloud-native breadth threat protection capabilities in Azure Defender
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact
Simplify compliance and manage risk with Microsoft Compliance Manager
5 identity priorities for 2021—strengthening security for the hybrid work era and beyond
Automating and operationalizing data protection with Dataguise and Microsoft Information Protection
What we like about Microsoft Defender for Endpoint
Why threat protection is critical to your Zero Trust security strategy
HAFNIUM targeting Exchange Servers with 0-day exploits
Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work
XLM + AMSI: New runtime defense against Excel 4.0 macro malware
Azure LoLBins: Protecting against the dual use of virtual machine extensions
Medius’ small IT team supports distributed workforce with Azure Active Directory
Secure containerized environments with updated threat matrix for Kubernetes
Analyzing attacks taking advantage of the Exchange Server vulnerabilities
Securing our approach to domain fronting within Azure
How to build a successful application security program
New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats
Zero Trust: 7 adoption strategies from security leaders
Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
Protect your business from email phishing with multi-factor authentication
Gamifying machine learning for stronger security and AI models
Threat matrix for storage services
Investigating a unique “form” of email delivery for IcedID malware
Secure unmanaged devices with Microsoft Defender for Endpoint now
How far have we come? The evolution of securing identities
Afternoon Cyber Tea: Cybersecurity has become a pillar of the business
MITRE Engenuity ATT&CK® Evaluation proves Microsoft Defender for Endpoint stops advanced attacks across platforms
Evolving beyond password complexity as an identity strategy
Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT
Meet critical infrastructure security compliance requirements with Microsoft 365
Center for Threat-Informed Defense teams up with Microsoft, partners to build the ATT&CK® for Containers matrix
AI security risk assessment using Counterfit
How to apply a Zero Trust approach to your IoT solutions
Stopping Carbanak+FIN7: How Microsoft led in the MITRE Engenuity® ATT&CK® Evaluation
Business email compromise: How Microsoft is combating this costly threat
Business email compromise campaign targets wide range of orgs with gift card scam
Threat and Vulnerability Management now supports all major platforms
How to secure your hybrid work world with a Zero Trust approach
Securing a new world of hybrid work: What to know and what to do
How a positive hybrid work culture can help you to mitigate insider risk
Mitigate OT security threats with these best practices
SimuLand: Understand adversary tradecraft and improve detection strategies
Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment
Resources for accelerating your Zero Trust journey
Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats
How user experience is shaping verifiable credentials and identity
New sophisticated email-based attack from NOBELIUM
Breaking down NOBELIUM’s latest early-stage toolset
Understanding the threat landscape and risks of OT environments
Microsoft acquires ReFirm Labs to enhance IoT security
Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview
odix and Microsoft: Protecting users against malware attacks with free FileWall license
Afternoon Cyber Tea: Cybersecurity challenged to meet diversity goals
CRSP: The emergency team fighting cyber attacks beside customers
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19
Improve your threat detection and response with Microsoft and Wortell
Strategies, tools, and frameworks for building an effective threat intelligence team
Windows 11 enables security by design from the chip to the cloud
MITRE ATT&CK® mappings released for built-in Azure security controls
Microsoft finds new NETGEAR firmware vulnerabilities that could lead to identity theft and full system compromise