Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study – In the last two years, we’ve seen a staggering increase in the adoption of cloud-based services, remote work solutions, bring your own device (BYOD), and IoT devices as organizations digitally transform themselves to enable a hybrid workforce.1 Zero Trust has become the essential security strategy for successfully preventing data breaches and mitigating risk in today’s complex cybersecurity landscape.
Join us to build solutions using Decentralized Identities – At the core of Decentralized Identity is verifiable credentials technology. It allows trusted providers to issue verified IDs to their users, such as a student ID from a university or a health record from a healthcare provider. When the user needs to prove a credential, they can share the verified ID digitally and the requester can confirm it’s been properly signed and is up to date automatically.
Align your security and network teams to Zero Trust security demands – The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with Jennifer Minella, Founder and Principal Advisor on Network Security at Viszen Security about strategies for aligning the security operations center (SOC) and network operations center (NOC) to meet the demands of Zero Trust and protect your enterprise.
Continuous Access Evaluation in Azure AD is now generally available! – We’re thrilled to announce the General Availability (GA) of Continuous Access Evaluation (CAE) as part of the overall Azure AD Zero Trust Session Management portfolio!
Get Hands-On KQL Practice with this Microsoft Sentinel Workbook – The Kusto Query Language (KQL) is the driving language for using Microsoft Sentinel. Though similar to SQL, new users must still learn and practice the language. To assist in accelerating learning the language, an interactive learning workbook has been created.
Protect your Smartsheet Deployment using Microsoft Defender for Cloud Apps – One of the latest app connectors to be added to Microsoft Defender for Cloud Apps is for Smartsheet. As we have in the past for other protected apps, we would like to share a few examples of how to use it to secure your Smartsheet deployment.
Learn about 4 approaches to comprehensive security that help leaders be fearless – The last 18 months have put unprecedented pressure on organizations to speed up their digital transformation as remote and hybrid work continue to become the new normal. Yet even with all the change and uncertainty, having the right security support system in place means your organization can still move forward confidently to turn your vision into reality. I’ve seen our customers demonstrate this fearlessness every day, and I love learning from them as we stand together against ongoing threats.
Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution – There has been a long-standing divide between SCADA (OT) and Corporate (IT) cybersecurity disciplines. This divide was often driven by significant differences in technology, tooling, and expertise. Organizations are often required to operate multiple monitoring teams to cover these dynamics which inevitably increases risk for blind spots, inefficiencies, and complexity. Understanding the threat requires convergence of IT/OT monitoring in consolidated approaches. The Microsoft Sentinel: IT/OT Threat Monitoring with Defender for IoT Solution unites IT and OT, providing an unprecedented step toward protecting critical OT assets and securing your organization.
Single Sign On Support for authentication in Microsoft Sentinel Notebooks – With this post we announce an improvement in the Sign on experience for MSTICPy Notebooks as well as simplification of the content within the “Getting Started Guide for Microsoft Sentinel ML Notebook”.