Security

Security

Microsoft Copilot for Security to Launch on April 1 with New Capabilities

Microsoft announced this morning some important updates for its Copilot for Security solution. The new AI assistant that launched in preview last year will become generally available for commercial customers starting on April 1. Microsoft Copilot for Security is a new AI-powered service that can assist organizations in improving their security posture. Security professionals can...

About Security

Welcome to the Security category page, your fortress for safeguarding digital assets. In an age where cyberthreats are ever-evolving, IT security is paramount. Here, you’ll find resources including best practices, tools, and strategies to protect networks, systems, and data. Whether you’re an IT professional looking to understand the basics or seeking advanced security solutions, or a business owner aiming to fortify your defenses, this page is your stronghold for cybersecurity knowledge.

LATEST

Security hero image

Russian State-Sponsored Hackers Stole Microsoft Source Code

Earlier this year, Microsoft disclosed a breach in its corporate email servers by Russian state-sponsored hackers. Now, the company revealed that the same hackers, known as Midnight Blizzard, have infiltrated Microsoft’s source code and other internal systems. In January, Microsoft unveiled that Midnight Blizzard had successfully gained unauthorized access to the email accounts of some…

View Article
Security

How Microsoft’s Secure Future Initiative Leverages AI to Transform Software Development

Last November, Microsoft introduced its Secure Future Initiative (SFI) to deal with cybersecurity threats. The company announced today the launch of a regular series to track the milestones and progress of the SFI, demonstrating a commitment to transparency and resilience. Microsoft Secure Future Initiative is a comprehensive effort to bolster security capabilities and protect customers…

View Article
Security – 4

Lazarus Group Exploits Windows Zero-Day Flaw in Rootkit Attacks

Microsoft has recently addressed a zero-day vulnerability within the Windows AppLocker driver. The security flaw has been exploited by the North Korean threat group Lazarus for privilege escalation to carry out rootkit attacks. The security flaw (tracked as CVE-2024-21338) was first discovered by the cybersecurity firm Avast last year. The Avast researchers created a proof-of-concept…

View Article
Security hero image

Microsoft Releases Internal Security Tool ‘PyRIT’ to Protect Generative AI Systems

Last week, Microsoft introduced its Python Risk Identification Toolkit for generative AI (PyRIT) The new tool provides security teams and machine learning engineers with tools to identify and mitigate risks within AI systems. In 2022, Microsoft introduced PyRIT to help its AI red team identify security risks within its generation AI systems, such as Copilot….

View Article
Security

Microsoft and OpenAI Adopt AI-Driven Strategy to Counter Nation-State Cyber Threats

Microsoft’s latest Cyber Signals 2024 report reveals the alarming trend of nation-state threat actors harnessing generative AI for malicious purposes. Microsoft has also outlined its proactive measures in deploying AI-powered defenses to tackle the ever-evolving threat landscape. Microsoft Threat Intelligence team has reported that over 300 threat actors are currently using AI and Language Model…

View Article
Security hero image

Azure Active Directory Flavors

Last Update: Feb 07, 2024

Sjoukje Zaal gives an overview of the different flavors of Azure Active Directory.

View Article
Security

Five Tactics Towards Achieving Zero Trust with Azure Active Directory

Last Update: Feb 01, 2024

For any modern enterprise that uses Azure Active Directory (now Microsoft Entra ID) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for…

View Article
Security hero image

Active Directory Security – 5 Steps to Secure AD

Last Update: Jan 30, 2024

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article
Security

Microsoft Provides More Details About ‘Midnight Blizzard’ Attacks

Microsoft has recently published an initial analysis of the cyber-attack that was carried out by Russian state-sponsored hackers in late November of 2023. The company has raised concerns that the same threat actor is currently targeting other organizations and has provided detailed guidance to help organizations strengthen their defenses. Last week, Microsoft disclosed that a…

View Article
Go to page