How Microsoft Mission Critical team helped secure AAD – We will be showcasing in detail what efforts our Identity experts in the Mission Critical Team have gone through for one of our customers in MEA. As a result, we achieved an immense overall improvement in their identity security posture.
Zero Trust: From security option to business imperative overnight – Zero Trust was something interesting to learn about, and most organizations were very much in the exploratory phase. As COVID-19 forced organizations across the world to send their workforce home, organizations rapidly focused on Zero Trust approaches to alleviate challenges of enabling and securing remote work.Zero Trust was something interesting to learn about, and most organizations were very much in the exploratory phase. As COVID-19 forced organizations across the world to send their workforce home, organizations rapidly focused on Zero Trust approaches to alleviate challenges of enabling and securing remote work.
How to organize your security team: The evolution of cybersecurity roles and responsibilities – Organizations are shifting from defending a traditional network perimeter (keeping business assets in a safe place) to more effective zero trust strategies (protect users, data, and business assets where they are). This transformation brings technology changes and also opens up questions of what people’s roles and responsibilities will look like in this new world.
Webinar: How to maximize Microsoft Defender ATP configuration using attack simulations –
We’re excited to invite you to join us for a webinar in partnership with SafeBreach happening on Tuesday, August 18, 2020 at 10:00 am PT. Hadar Feldman, Sr. Program Manager at Microsoft and Valeriy Leykin, Product Manager at SafeBreach will provide an overview of the integration of SafeBreach’s breach and attack simulation capabilities with Microsoft Defender ATP evaluation lab.
Microsoft Authenticator app lock now enabled by default – With our latest release, as part of our effort to make your sign-in experience even more secure, App Lock will be enabled by default if you’ve set up a PIN or biometric on your device.
Microsoft joins Open Source Security Foundation – Microsoft has invested in the security of open-source software for many years and today I’m excited to share that Microsoft is joining industry partners to create the Open Source Security Foundation (OpenSSF), a new cross-industry collaboration hosted at the Linux Foundation.
Azure AD: Automated user provisioning from SAP SuccessFactors is now GA – SAP and Microsoft have been working closely together to enhance existing integrations between Azure AD and SAP Cloud Identity Services of the SAP Cloud Platform, making it easier to manage and secure your SAP applications.
Whats new: Azure Sentinel and Microsoft Defender ATP improved alert integration – The new integration has significant advantages in improved details and context, which are meant to facilitate and expedite triage and investigation of Microsoft Defender ATP incidents in Azure Sentinel.
What’s new: SOC operational metrics now available in Sentinel – Sentinel incident data is now available in your Log Analytics workspace! You can use this data to report on metrics within your Security Operations Center.
Azure Security Center Secure Score Reduction Alert – Azure Security Center continuously assesses your resources, subscriptions for security issues. It mimics the work of a security analyst, reviews security recommendations across all workloads, applies advanced algorithms to determine how critical each recommendation is, and calculates Secure Score based on the active recommendations.
New features and improvements to Sensitivity labels for Containers Webinar – While we recently made generally available the ability to use sensitivity labels in SharePoint Online (SPO) and the concept of container labels – i.e. the ability to apply a label to a SPO site, Teams site and O365 Group we don’t plan to stop there.
Security baseline (FINAL): Windows 10 and Windows Server, version 2004 – This Windows 10 feature update brings very few new policy settings, which we list in the accompanying documentation. Only one new policy meets the criteria for inclusion in the security baseline (described below), and we are removing one setting from the baseline. There are two additional policies we are not including in the baseline because of compatibility concerns, but which you may want to consider for your organization.
Azure Sentinel Insecure Protocols Workbook Reimagined – In this article, we’ll share significant, functional enhancements we’ve made to the Insecure Protocols Workbook (IP Workbook) and we’ll detail how you can leverage these improvements to mitigate with speed, accuracy, and efficiency.
Afternoon Cyber Tea: Revisiting social engineering: The human threat to cybersecurity – To dig into how social attacks like these are executed, and why they work time and again, I spoke with Rachel Tobac on a recent episode Afternoon Cyber Tea with Ann Johnson.