Welcome to the Security category page, your fortress for safeguarding digital assets. In an age where cyberthreats are ever-evolving, IT security is paramount. Here, you’ll find resources including best practices, tools, and strategies to protect networks, systems, and data. Whether you’re an IT professional looking to understand the basics or seeking advanced security solutions, or a business owner aiming to fortify your defenses, this page is your stronghold for cybersecurity knowledge.
This article explores how Microsoft Entra’s new token theft protection policy can provide robust protection against token theft. By leveraging a new Conditional Access policy, organizations can safeguard their digital identities and sensitive data from cyberthreats. Securing your IT landscape is increasingly becoming critical. With cyberthreats on the rise, and showing no signs of slowing…
Last Update: Sep 04, 2024
In this post about Azure network security group best practices, Aidan offers tips for creating, configuring, and associating network security groups (NSGs) in Azure Resource Manager or CSP.
Last Update: Jul 01, 2022
Microsoft Defender has many layers and trying to understand all of the different components can be complex.
Last Update: Sep 04, 2024
A comparative overview of BitLocker and Encrypting File System (EFS) in Windows 7 and how they can be leveraged to improve the security of your data.
Last Update: Sep 04, 2024
Network security groups (NSGs) can offer network security and policy enforcement for virtual networks in an Azure Resource Manager (ARM) or CSP deployment.
Last Update: Sep 04, 2024
Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…
Last Update: Nov 19, 2024
In this article, we are going to take a brief look at what Azure Sphere is and how it is helping to protect Internet of Things (IoT) devices with additional security overlay. In today’s world, we are surrounded by billions of devices – all with microcontrollers embedded in them for control and to add logic….
Last Update: Sep 04, 2024
Learn how to reset Windows Server security to default settings.
Last Update: Sep 04, 2024
Easily secure subnets in a virtual network with the help of Network Security Groups in Microsoft Azure.
Microsoft has recently issued an alert to warn users about the growing misuse of its Quick Assist app on Windows and Mac devices. The Microsoft Security team detailed that cybercriminals are now harnessing AI to launch sophisticated attacks aimed at stealing sensitive information and credentials. The Quick Assist app allows users to remotely connect to…
Microsoft today released its second Secure Future Initiative (SFI) progress report. This new report outlines significant efforts in fortifying digital infrastructure and enhancing the cybersecurity resilience of organizations worldwide. What is the Secure Future Initiative (SFI)? Microsoft launched its Secure Future Initiative in November 2023. The SFI includes six pillars or areas of focus, with…
Researchers predict that global cybersecurity spending will grow by 12.2% by 2025, driven by the escalating frequency and sophistication of cyber threats. According to new IDC research, this upward trend will continue, with investments expected to reach $377 billion by 2028 as organizations double down on digital defense strategies. In the Worldwide Security Spending Guide,…
Microsoft has rolled out multi-workspace for multi-tenant support to its Unified Security Operations (SecOps) Platform. This new capability is now available in public preview for commercial customers. Microsoft’s Unified SecOps Platform integrates the capabilities of Microsoft Defender XDR, Microsoft Sentinel, Microsoft Security Exposure Management, and generative AI into a comprehensive portal. This platform enhances security…
Microsoft has announced new automatic attack disruption features for its Defender XDR solution. These enhancements are designed to quickly detect and contain compromised devices before attackers can spread across the enterprise network. The automatic attack disruption feature uses AI and threat intelligence to quickly identify and contain ongoing cyberattacks. It isolates compromised devices and blocks…
Old habits die hard and Microsoft’s efforts to get users and organizations to adopt passwordless authentication has been a slow burn. At last week’s Secure 2025 event, Microsoft announced that it’s hoping to encourage more users to choose passwordless authentication by improving the Microsoft Account login experience. Here’s what we found out. Microsoft and other…
Even cybersecurity experts aren’t immune to sophisticated phishing attacks—just ask Troy Hunt, the creator of “Have I Been Pwned,” who recently fell victim to a cleverly disguised MailChimp scam. Hackers tricked him into handing over credentials, leading to the compromise of 16,000 email records in under two minutes. What happened? In his blog post “A…
Last Update: Mar 25, 2025
Microsoft has announced a new partnership with Red Button, an Israel-based Distributed Denial-of-Service (DDoS) attack simulation testing solutions provider. The Redmond giant believes that this collaboration will enable organizations to identify gaps and develop effective strategies to mitigate DDoS attacks. “With Red Button’s DDoS Testing service suite, you will be able to work with a…
Last Update: Mar 25, 2025
An often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…
Cybercriminals have discovered a way to exploit Microsoft’s Trusted Signing Platform by acquiring short-lived certificates. This allows them to disguise malware as legitimate software, helping malicious programs evade security measures and gain user trust. Microsoft’s Trusted Signing Platform is a service that allows software developers to sign their applications and executables digitally. The signature verifies…
Microsoft has announced plans to add support for AI-powered agents to its Security Copilot solution. The company will launch six in-house security agents alongside five partner-developed agents in public preview on April 27. “These AI-powered agents autonomously handle high-volume security and IT tasks, seamlessly integrated with Microsoft Security solutions and existing security tools. Purpose-built for…
At the Secure 2025 cybersecurity conference, Microsoft announced a range of updates for its Defender XDR platform, aiming to enhance threat detection and response. The first new AI-powered feature that the company highlighted today is the new Microsoft Security Copilot Phishing Triage Agent in the Defender Portal. According to Microsoft, 90 percent of the emails…